Date: Fri, 15 Sep 2000 15:34:10 -0400 From: Bill Moran <wmoran@columbus.rr.com> Cc: stable@FreeBSD.ORG Subject: Re: qmail + freebsd = reboot Message-ID: <39C279B2.46BCA0FA@columbus.rr.com> References: <Pine.BSF.4.21.0009141707460.95869-100000@resnet.uoregon.edu> <00091510304000.03232@idefix.omnix.net>
next in thread | previous in thread | raw e-mail | index | archive | help
Did you install the patch found here?: http://www.ckdhr.com/ckd/qmail-103.patch I don't know if this is the problem you're describing, but it sounds familiar. Didier Derny wrote: > > hi, > > there r bugs, in qmail + 1 in freebsd (at least for 3.x) > > check ipme.c in the qmail source it allocat a 256 bytes buffers > and use it in a structure for an ioctl call to freebsd to get some > information from the network interface. > > first the 256 byte buffer is arbitrarily allocated (first bug) > then freebsd trash the memory located "behind/above" this buffer > this buffer is not large enough if you have too many ip aliases > even though the length of the buffer is declared in the structure > (freebsd bug) > > for me it crashed qmail-remote and qmail-smtpd (/var/qmail/control) database > problems. > > I increased the buffer to 512 bytes and it solved the problem > [it's not clean but it worked for me] -- FreeBSD ('BSD'): No battles to the death are recalled. It is a small Daemon wearing sneakers. It is normally found on Internet servers and powerful desktops, and moves very quickly. A kill of this poweful creature is enough to tick off any sysadmin. It is highly magical, having the power to serve. It resists DoS and SYN flood attacks. Nothing is known about its attack. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?39C279B2.46BCA0FA>
