Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 15 Sep 2000 15:34:10 -0400
From:      Bill Moran <wmoran@columbus.rr.com>
Cc:        stable@FreeBSD.ORG
Subject:   Re: qmail + freebsd = reboot
Message-ID:  <39C279B2.46BCA0FA@columbus.rr.com>
References:  <Pine.BSF.4.21.0009141707460.95869-100000@resnet.uoregon.edu> <00091510304000.03232@idefix.omnix.net>

next in thread | previous in thread | raw e-mail | index | archive | help

Did you install the patch found here?:
http://www.ckdhr.com/ckd/qmail-103.patch
I don't know if this is the problem you're describing, but it sounds
familiar.

Didier Derny wrote:
> 
> hi,
> 
> there r bugs, in qmail + 1 in freebsd (at least for 3.x)
> 
> check ipme.c in the qmail source it allocat a 256 bytes buffers
> and use it in a structure for an ioctl call to freebsd to get some
> information from the network interface.
> 
> first the 256 byte buffer is arbitrarily allocated (first bug)
> then freebsd trash the memory located "behind/above" this buffer
> this buffer is not large enough if you have too many ip aliases
> even though the length of the buffer is declared in the structure
> (freebsd bug)
> 
> for me it crashed qmail-remote and qmail-smtpd (/var/qmail/control) database
> problems.
> 
> I increased the buffer to 512 bytes and it solved the problem
> [it's not clean but it worked for me]

--
FreeBSD ('BSD'):
No battles to the death are recalled. It is a small Daemon wearing
sneakers. It
is normally found on Internet servers and powerful desktops, and moves
very
quickly. A kill of this poweful creature is enough to tick off any
sysadmin. It
is highly magical, having the power to serve. It resists DoS and SYN
flood
attacks. Nothing is known about its attack.


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-stable" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?39C279B2.46BCA0FA>