Details

    • Technical task
    • Resolution: Fixed
    • Major
    • Lustre 2.4.0
    • Lustre 2.4.0, Lustre 2.1.3
    • 4410

    Description

      Thanks to the Coverity tool, we found some memory corruptions in the Lustre code, and more specifically cases of out-of-bounds access in functions sec_flags2str() and sptlrpc_secflags2str().
      These functions take as arguments a buffer (2nd) and its size (3rd), that will be used by strncat(). Given that strncat() always adds a trailing '\0', the size passed to it must be 'bufsize-1'.

      I will propose a patch to address this problem.

      Sebastien.

      Attachments

        Issue Links

          Activity

            [LU-1855] Coverity: Fix 'out-of-bounds access' errors
            mdiep Minh Diep added a comment -

            landed on master

            mdiep Minh Diep added a comment - landed on master
            mdiep Minh Diep added a comment -

            sure

            mdiep Minh Diep added a comment - sure
            pjones Peter Jones added a comment -

            Thanks for the patch Sebastien. Minh can you please take care of landing this patch?

            pjones Peter Jones added a comment - Thanks for the patch Sebastien. Minh can you please take care of landing this patch?

            The patch is available here:
            http://review.whamcloud.com/3902

            Could you please review it?

            sebastien.buisson Sebastien Buisson (Inactive) added a comment - The patch is available here: http://review.whamcloud.com/3902 Could you please review it?

            People

              mdiep Minh Diep
              sebastien.buisson Sebastien Buisson (Inactive)
              Votes:
              0 Vote for this issue
              Watchers:
              4 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: