Red Hat Bugzilla – Bug 141733
buffer overflow in nfs mount when ip address too long
Last modified: 2007-11-30 17:10:56 EST
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (compatible; Konqueror/3.3; Linux) (KHTML, like Gecko)
Description of problem:
The next comand failed :
mount -t nfs 192.168.168.168:/ /mnt/u
Version-Release number of selected component (if applicable):
Steps to Reproduce:
1. mount -t nfs 192.168.168.200 /mnt/u
Actual Results: *** buffer overflow detected ***
Aborted (core dumped)
Expected Results: should mount the nfs directory to the /mnt/u without error message
The problem is in the nfs4 patch, where in the nsfmount subroutine
the declared cbuf size is too small (20 bytes) for longer ip addresses.
FIX: Please increase it.
FIX CHECK: After I increased the cbuf to 128 bytes there was no problem anymore.
Steve, this one probably warrants an erratum for affected releases...
Created attachment 107898 [details]
A patch the increase the input buffer size and protects against further buffer overruns
Fixed in util-linux-2.12a-19
Fixed and released. We can close it.