Details
-
Technical task
-
Resolution: Fixed
-
Major
-
Lustre 2.4.0, Lustre 2.1.3
-
4410
Description
Thanks to the Coverity tool, we found some memory corruptions in the Lustre code, and more specifically cases of out-of-bounds access in functions sec_flags2str() and sptlrpc_secflags2str().
These functions take as arguments a buffer (2nd) and its size (3rd), that will be used by strncat(). Given that strncat() always adds a trailing '\0', the size passed to it must be 'bufsize-1'.
I will propose a patch to address this problem.
Sebastien.
Attachments
Issue Links
- is related to
-
LU-17000 Coverity static analysis issues
- Open