Bug 126483 - large argv[0] are not handled correctly
large argv[0] are not handled correctly
Product: Red Hat Enterprise Linux 3
Classification: Red Hat
Component: ia32el (Show other bugs)
ia64 Linux
medium Severity high
: ---
: ---
Assigned To: Jakub Jelinek
Depends On:
  Show dependency treegraph
Reported: 2004-06-22 07:03 EDT by Yoav Zach
Modified: 2008-05-01 11:38 EDT (History)
0 users

See Also:
Fixed In Version: 1.0-4
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2004-10-02 13:51:00 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)
fixes the problem of shift_argv() (786 bytes, patch)
2004-06-22 07:06 EDT, Yoav Zach
no flags Details | Diff

  None (edit)
Description Yoav Zach 2004-06-22 07:03:33 EDT
Description of problem:
There is a problem in the function that shifts the argument vector - 
shift_argv() in btlib_main.c, which causes 32 bit processes with 
large argv[0] to have their argv messed up.

Version-Release number of selected component (if applicable):
libia32x.so - 4602

How reproducible:
Run 32 bit binary on the of IA-32 EL and pass it a very large argv[0].

Steps to Reproduce:
Actual results:

Expected results:

Additional info:
Comment 1 Yoav Zach 2004-06-22 07:06:15 EDT
Created attachment 101326 [details]
fixes the problem of shift_argv()

Note You need to log in before you can comment on or make changes to this bug.