aboutsummaryrefslogtreecommitdiffstats
path: root/erts/autoconf/install-sh
diff options
context:
space:
mode:
authorIngela Anderton Andin <[email protected]>2016-03-01 15:19:36 +0100
committerIngela Anderton Andin <[email protected]>2016-03-02 15:28:58 +0100
commitb1e4836bcfbfdec0504219ed490c5f53860d8106 (patch)
treec43b49a187f99ddd17506727225757d272dcb910 /erts/autoconf/install-sh
parent75bc5bebc070a59535b8f6b7b9085c210b4723b5 (diff)
downloadotp-b1e4836bcfbfdec0504219ed490c5f53860d8106.tar.gz
otp-b1e4836bcfbfdec0504219ed490c5f53860d8106.tar.bz2
otp-b1e4836bcfbfdec0504219ed490c5f53860d8106.zip
Skips any sockets with unsupported protocols.
Patch from end of PR 864 Fixes problem reported in the PR by jeckersb In this error case, a negative file descriptor is now saved at listensock[i], which leads to a buffer overflow later on at https://github.com/msantos/otp/blob/epmd-IPv6-node-reg2/erts/epmd/src/epmd_srv.c#L498 when calling FD_ISSET(listensock[i],&read_mask). To reproduce this: Completely disable IPv6 with ipv6.disable=1 on the kernel command line Build with fortified code (RHEL/CentOS default): CFLAGS='-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mtune=generic -fno-strict-aliasing'
Diffstat (limited to 'erts/autoconf/install-sh')
0 files changed, 0 insertions, 0 deletions