This is the mail archive of the
glibc-bugs@sourceware.org
mailing list for the glibc project.
[Bug nscd/16760] New: Overlapping source and destination in calls to stpcpy from nscd
- From: "siddhesh at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: glibc-bugs at sourceware dot org
- Date: Thu, 27 Mar 2014 04:00:09 +0000
- Subject: [Bug nscd/16760] New: Overlapping source and destination in calls to stpcpy from nscd
- Auto-submitted: auto-generated
https://sourceware.org/bugzilla/show_bug.cgi?id=16760
Bug ID: 16760
Summary: Overlapping source and destination in calls to stpcpy
from nscd
Product: glibc
Version: unspecified
Status: NEW
Severity: normal
Priority: P2
Component: nscd
Assignee: siddhesh at redhat dot com
Reporter: siddhesh at redhat dot com
CC: drepper.fsp at gmail dot com
The nscd netgroups code uses stpcpy to copy over triplet values into the
buffer. The source and destination addresses may overlap when all three values
are non-NULL and in the expected (host, user, domain) order. This is caught by
valgrind as:
==3181== Source and destination overlap in stpcpy(0x19973b48, 0x19973b48)
==3181== at 0x4C2F30A: stpcpy (in
/usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so)
==3181== by 0x12567A: addgetnetgrentX (string3.h:111)
==3181== by 0x12722D: addgetnetgrent (netgroupcache.c:665)
==3181== by 0x11114C: nscd_run_worker (connections.c:1338)
==3181== by 0x4E3C102: start_thread (pthread_create.c:309)
==3181== by 0x59B81AC: clone (clone.S:111)
==3181==
Fix coming up.
--
You are receiving this mail because:
You are on the CC list for the bug.