Bug 2203909 - client: possibly wild pointer read when reconnection to mds
Summary: client: possibly wild pointer read when reconnection to mds
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Ceph Storage
Classification: Red Hat Storage
Component: CephFS
Version: 5.3
Hardware: Unspecified
OS: Unspecified
unspecified
medium
Target Milestone: ---
: 5.3z4
Assignee: Milind Changire
QA Contact: Hemanth Kumar
Akash Raj
URL:
Whiteboard:
Depends On:
Blocks: 2210690
TreeView+ depends on / blocked
 
Reported: 2023-05-15 14:56 UTC by Venky Shankar
Modified: 2023-07-19 16:19 UTC (History)
6 users (show)

Fixed In Version: ceph-16.2.10-176.el8cp
Doc Type: Bug Fix
Doc Text:
.Client programs no longer crash after releasing memory Previously, when releasing memory, the pointer access would be saved for future reference. This caused the programs to crash on the client-side. With this fix, memory is allocated and `UserPerm` contents are copied to newly allocated memory instead of saving pointers for future reference, thereby preventing the programs from crashing.
Clone Of:
Environment:
Last Closed: 2023-07-19 16:19:10 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Ceph Project Bug Tracker 59514 0 None None None 2023-05-15 14:56:17 UTC
Red Hat Issue Tracker RHCEPH-6662 0 None None None 2023-05-15 14:57:59 UTC
Red Hat Product Errata RHBA-2023:4213 0 None None None 2023-07-19 16:19:53 UTC

Description Venky Shankar 2023-05-15 14:56:18 UTC
This bug was initially created as a copy of Bug #2203906.

Comment 1 RHEL Program Management 2023-05-15 14:56:26 UTC
Please specify the severity of this bug. Severity is defined here:
https://bugzilla.redhat.com/page.cgi?id=fields.html#bug_severity.

Comment 13 errata-xmlrpc 2023-07-19 16:19:10 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Red Hat Ceph Storage 5.3 Bug Fix update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2023:4213


Note You need to log in before you can comment on or make changes to this bug.