[Bug 1955129] [NEW] trace-cmd report buffer overflow detected

Launchpad Bug Tracker 1955129 at bugs.launchpad.net
Fri Dec 17 16:23:36 UTC 2021


You have been subscribed to a public bug by Ubuntu Foundations Team Bug Bot (crichton):

[IMPACT]

When running trace-cmd report on Bionic it crashes with

*** buffer overflow detected ***: trace-cmd terminated
Aborted (core dumped)


[TEST CASE]

Prepare a simple script to trace e.g. :

#!/usr/bin/python
import socket
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.close()

then

$ sudo trace-cmd record -a -p function_graph -g __fput -g sock_close -g
tcp_close python2 ./close.py

$ sudo trace-cmd report

The latter will fail with buffer overflow detected


[WHERE THINGS COULD GO WRONG]

The fixing commit changes the size of a buffer from 20 to 24 in arg_eval() function
to avoid buffer overflow.
Any potential regression would occur in that function.


[OTHER]

Only Bionic is affected, it is fixed in newer releases.

Fix upstream commit 1375d98d8017e371776adbef10122a57ce2100e5

** Affects: trace-cmd (Ubuntu)
     Importance: Medium
     Assignee: Ioanna Alifieraki (joalif)
         Status: In Progress

** Affects: trace-cmd (Ubuntu Bionic)
     Importance: Medium
     Assignee: Ioanna Alifieraki (joalif)
         Status: In Progress


** Tags: patch sts
-- 
trace-cmd report buffer overflow detected
https://bugs.launchpad.net/bugs/1955129
You received this bug notification because you are a member of Ubuntu Sponsors Team, which is subscribed to the bug report.



More information about the Ubuntu-sponsors mailing list