Bug 493578
Summary: | ss utility, iproute2-ss061002 - Segmentation fault | ||||||
---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 5 | Reporter: | Mihail Peltekov <misho> | ||||
Component: | iproute | Assignee: | Marcela Mašláňová <mmaslano> | ||||
Status: | CLOSED ERRATA | QA Contact: | BaseOS QE Security Team <qe-baseos-security> | ||||
Severity: | low | Docs Contact: | |||||
Priority: | low | ||||||
Version: | 5.3 | CC: | ebenes, misho, ralph, robertomf, rvokal, tao, vanhoof | ||||
Target Milestone: | rc | Keywords: | Regression | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2009-10-21 11:04:45 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Attachments: |
|
Description
Mihail Peltekov
2009-04-02 10:41:39 UTC
*** Bug 493622 has been marked as a duplicate of this bug. *** You can use for the meantime: "ss -f inet" After fixing previous problem "not showing all socket states" #446198 with upstream commit ab01dbbb94b8620c2bc85e30e107c3a9f0870a73 show up different bugs. On RHEL-5 machine could be seen this one, which could be fixed by upstream commit: 69cae645b28edbba53c8601ddeba01430e5e9da0 Created attachment 338509 [details]
Upstream commit git 69cae645b28edbba53c8601ddeba01430e5e9da0
In the function: static FILE *generic_proc_open(const char *env, const char *name) { char store[128]; const char *p = getenv(env); FILE *fp; if (!p) { p = getenv("PROC_ROOT") ? : "/proc"; snprintf(store, sizeof(store)-1, "%s/%s", p, name); p = store; } return fopen(p, "r"); } PROC_ROOT can be something longer than 128 and cause other segfault. (In reply to comment #7) > In the function: > > static FILE *generic_proc_open(const char *env, const char *name) > { > char store[128]; > const char *p = getenv(env); > FILE *fp; > if (!p) { > p = getenv("PROC_ROOT") ? : "/proc"; > snprintf(store, sizeof(store)-1, "%s/%s", p, name); > p = store; > } > > return fopen(p, "r"); > } > > PROC_ROOT can be something longer than 128 and cause other segfault. If you have a reproducer for this problem, then please open a new bug. This is different problem. (In reply to comment #8) > (In reply to comment #7) > > In the function: > > > > static FILE *generic_proc_open(const char *env, const char *name) > > { > > char store[128]; > > const char *p = getenv(env); > > FILE *fp; > > if (!p) { > > p = getenv("PROC_ROOT") ? : "/proc"; > > snprintf(store, sizeof(store)-1, "%s/%s", p, name); > > p = store; > > } > > > > return fopen(p, "r"); > > } > > > > PROC_ROOT can be something longer than 128 and cause other segfault. > > If you have a reproducer for this problem, then please open a new bug. This is > different problem. I didn't see (i'm blind..) the snprintf out of bound comprobation and the segfault was produced because the content of PROC_ROOT was an invalid path (you fixed it in the last attachment). Sorry. An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHBA-2009-1520.html |