diff options
author | Ingela Anderton Andin <[email protected]> | 2016-03-01 15:19:36 +0100 |
---|---|---|
committer | Ingela Anderton Andin <[email protected]> | 2016-03-02 15:28:58 +0100 |
commit | b1e4836bcfbfdec0504219ed490c5f53860d8106 (patch) | |
tree | c43b49a187f99ddd17506727225757d272dcb910 /erts/info.src | |
parent | 75bc5bebc070a59535b8f6b7b9085c210b4723b5 (diff) | |
download | otp-b1e4836bcfbfdec0504219ed490c5f53860d8106.tar.gz otp-b1e4836bcfbfdec0504219ed490c5f53860d8106.tar.bz2 otp-b1e4836bcfbfdec0504219ed490c5f53860d8106.zip |
Skips any sockets with unsupported protocols.
Patch from end of PR 864
Fixes problem reported in the PR by jeckersb
In this error case, a negative file descriptor is now saved at
listensock[i], which leads to a buffer overflow later on at
https://github.com/msantos/otp/blob/epmd-IPv6-node-reg2/erts/epmd/src/epmd_srv.c#L498
when calling FD_ISSET(listensock[i],&read_mask).
To reproduce this:
Completely disable IPv6 with ipv6.disable=1 on the kernel command line
Build with fortified code (RHEL/CentOS default): CFLAGS='-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mtune=generic -fno-strict-aliasing'
Diffstat (limited to 'erts/info.src')
0 files changed, 0 insertions, 0 deletions