From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 30088 invoked by alias); 28 Jun 2007 08:07:35 -0000 Received: (qmail 30061 invoked by uid 9452); 28 Jun 2007 08:07:35 -0000 Date: Thu, 28 Jun 2007 08:07:00 -0000 Message-ID: <20070628080735.30060.qmail@sourceware.org> From: pcaulfield@sourceware.org To: cluster-cvs@sources.redhat.com Subject: cluster/cman/daemon daemon.c Mailing-List: contact cluster-cvs-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: cluster-cvs-owner@sourceware.org X-SW-Source: 2007-q2/txt/msg00402.txt.bz2 CVSROOT: /cvs/cluster Module name: cluster Branch: RHEL50 Changes by: pcaulfield@sourceware.org 2007-06-28 08:07:35 Modified files: cman/daemon : daemon.c Log message: Make sure to cleanup the buffer when processing each request or dirty data can be passed from one request to another. Add a barrier to make sure that the socket data are not bigger than the buffer or we overflow somewhere at random. 21:41 #sistina: < feist> pjc: can you commit that first cman security fix to RHEL50, (the rpm has already been built, but it would be nice for tracking purposes). Patches: http://sourceware.org/cgi-bin/cvsweb.cgi/cluster/cman/daemon/daemon.c.diff?cvsroot=cluster&only_with_tag=RHEL50&r1=1.32&r2=1.32.4.1