| To: | pcp@xxxxxxxxxxx |
|---|---|
| Subject: | [Bug 1062] mmv pmda sensitive to malevolent data |
| From: | bugzilla-daemon@xxxxxxxxxxx |
| Date: | Wed, 13 Aug 2014 18:19:45 +0000 |
| Auto-submitted: | auto-generated |
| Delivered-to: | pcp@xxxxxxxxxxx |
| In-reply-to: | <bug-1062-835@xxxxxxxxxxxxxxxx/bugzilla/> |
| References: | <bug-1062-835@xxxxxxxxxxxxxxxx/bugzilla/> |
|
Comment # 1
on bug 1062
from Frank Ch. Eigler
(A weaker variant of this problem involves the inherent risks of lack of concurrency control between an application that asynchronously modifies the mmv shmem data, at the same time as the pmda mmv can read it. Even four-byte metric values can get corrupted if an app happens to write them byte-by-byte in an unexpected way, never mind strings.) You are receiving this mail because:
|
| <Prev in Thread] | Current Thread | [Next in Thread> |
|---|---|---|
| ||
| Previous by Date: | Re: PCP Network Latency PMDA, William Cohen |
|---|---|
| Next by Date: | Re: [pcp] PCP Network Latency PMDA, William Cohen |
| Previous by Thread: | pcp_3.9.9_i386.changes ACCEPTED into unstable, Debian FTP Masters |
| Next by Thread: | [Bug 1062] mmv pmda sensitive to malevolent data, bugzilla-daemon |
| Indexes: | [Date] [Thread] [Top] [All Lists] |