[Bug 1955129] [NEW] trace-cmd report buffer overflow detected
Launchpad Bug Tracker
1955129 at bugs.launchpad.net
Fri Dec 17 16:23:36 UTC 2021
You have been subscribed to a public bug by Ubuntu Foundations Team Bug Bot (crichton):
[IMPACT]
When running trace-cmd report on Bionic it crashes with
*** buffer overflow detected ***: trace-cmd terminated
Aborted (core dumped)
[TEST CASE]
Prepare a simple script to trace e.g. :
#!/usr/bin/python
import socket
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.close()
then
$ sudo trace-cmd record -a -p function_graph -g __fput -g sock_close -g
tcp_close python2 ./close.py
$ sudo trace-cmd report
The latter will fail with buffer overflow detected
[WHERE THINGS COULD GO WRONG]
The fixing commit changes the size of a buffer from 20 to 24 in arg_eval() function
to avoid buffer overflow.
Any potential regression would occur in that function.
[OTHER]
Only Bionic is affected, it is fixed in newer releases.
Fix upstream commit 1375d98d8017e371776adbef10122a57ce2100e5
** Affects: trace-cmd (Ubuntu)
Importance: Medium
Assignee: Ioanna Alifieraki (joalif)
Status: In Progress
** Affects: trace-cmd (Ubuntu Bionic)
Importance: Medium
Assignee: Ioanna Alifieraki (joalif)
Status: In Progress
** Tags: patch sts
--
trace-cmd report buffer overflow detected
https://bugs.launchpad.net/bugs/1955129
You received this bug notification because you are a member of Ubuntu Sponsors Team, which is subscribed to the bug report.
More information about the Ubuntu-sponsors
mailing list