Bug 1135 - string overflow with "mangling method = hash"
Summary: string overflow with "mangling method = hash"
Status: CLOSED FIXED
Alias: None
Product: Samba 3.0
Classification: Unclassified
Component: File Services (show other bugs)
Version: 3.0.2a
Hardware: All Linux
: P3 normal
Target Milestone: none
Assignee: Gerald (Jerry) Carter (dead mail address)
QA Contact:
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2004-02-27 09:40 UTC by Thomas Schalch
Modified: 2005-08-24 10:16 UTC (History)
0 users

See Also:


Attachments
level 10 log file (3.18 KB, application/octet-stream)
2004-03-31 07:30 UTC, Gerald (Jerry) Carter (dead mail address)
no flags Details

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Schalch 2004-02-27 09:40:57 UTC
When setting "mangling method = hash" every file access triggers a 
[2004/02/27 18:34:54, 0] lib/util_str.c:safe_strcpy_fn(595)
  ERROR: string overflow by 1 (13 - 12) in safe_strcpy [FILENAME]
Comment 1 Gerald (Jerry) Carter (dead mail address) 2004-03-26 08:05:03 UTC
what version is this (assuming it is not 3.0alpha24)?
Can you provide a level 10 debug log?  Thanks.
Comment 2 Gerald (Jerry) Carter (dead mail address) 2004-03-31 07:30:10 UTC
Created attachment 462 [details]
level 10 log file
Comment 3 SATOH Fumiyasu 2004-07-12 19:01:59 UTC
This bug seems gone by the following fix in Samba 3.0.5rcX.

    * Fix bogus error message when using "mangling method = hash" 
      rather than hash2.
Comment 4 Gerald (Jerry) Carter (dead mail address) 2004-07-13 04:58:07 UTC
closing as fixed.
Comment 5 Gerald (Jerry) Carter (dead mail address) 2005-08-24 10:16:11 UTC
sorry for the same, cleaning up the database to prevent unecessary reopens of bugs.