| Summary: | mail-filter/spamassassin-3.2.5 *** buffer overflow detected *** when options inet6 is set in resolv.conf | ||
|---|---|---|---|
| Product: | Gentoo Linux | Reporter: | Marcin Mirosław <bug> |
| Component: | Current packages | Assignee: | Gentoo Perl team <perl> |
| Status: | RESOLVED NEEDINFO | ||
| Severity: | normal | ||
| Priority: | High | ||
| Version: | unspecified | ||
| Hardware: | x86 | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Package list: | Runtime testing required: | --- | |
| Bug Depends on: | |||
| Bug Blocks: | 301125 | ||
| Attachments: |
spamassassin log
emerge --info |
||
|
Description
Marcin Mirosław
2009-10-08 08:31:47 UTC
Created attachment 206416 [details]
spamassassin log
Created attachment 206418 [details]
emerge --info
This problem is old.. http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=405694 What version of dev-perl/IO-Socket-INET6 do you have installed? I've installed dev-perl/IO-Socket-INET6-2.51 . Now, i can't reproduce error. I don't know wich upgrade solved problem. Now i've got: glibc-2.10.1-r1 , spamassassin-3.2.5-r2 , IO-Socket-INET6-2.51 . So i'm closing this bug. (Is resolution "fixed" correct one? Problem dissappears without founding a reason.) (In reply to comment #6) > Now, i can't reproduce error. I don't know wich upgrade solved problem. Now > i've got: glibc-2.10.1-r1 , spamassassin-3.2.5-r2 , IO-Socket-INET6-2.51 . So > i'm closing this bug. (Is resolution "fixed" correct one? Problem dissappears > without founding a reason.) > Thanks for providing further feedback. Technically, "WORKSFORME" would be the resolution, but it really doesn't matter, imo. :) I'm sorry, but i have to reopen bug :( Yesterday i've added "options inet6" to resolv.conf, today i've found few messages in syslog: 2010-01-16T11:44:42.355423+01:00 localhost *** buffer overflow detected ***: perl - terminated 2010-01-16T11:44:42.355503+01:00 localhost perl: buffer overflow attack in function <unknown> - terminated 2010-01-16T11:44:42.355525+01:00 localhost Report to http://bugs.gentoo.org/ I still don't know what special case must happend to trigger this error. Problem doesn't appear on every mail (which is sended from exim to spamd through tcp connection). I'll try to found how to reproduce this error. IMHO this bug isn't so important to block STABLREQ. Segfault appears when mail shoud be reported to SpamCop (no matter if SA is invoked as "spamassassin -r" or it is done by spamd process). I suppose the problem is in function reporting spam to SpamCop. Marcin, can we close the bug so STABLEREQ bug 301125 can proceed? As i said at #8 , go ahead. |