Actions
Bug #17663
closedldap: unhandled exception from rgw::from_base64() in RGW_Auth_S3::authorize_v2()
% Done:
0%
Source:
other
Tags:
Backport:
jewel
Regression:
No
Severity:
3 - minor
Reviewed:
Affected Versions:
ceph-qa-suite:
Pull request ID:
Crash signature (v1):
Crash signature (v2):
Description
from downstream testing, when given a non-base64 access key:
uv1 ondisk = 0) v7 ==== 128+0+0 (1628015358 0 0) 0x7f9ce80071b0 con 0x7f9e4401ced0 -6> 2016-10-21 11:40:16.141418 7f9e54cf6700 1 -- 10.8.128.104:0/2466162087 <== osd.0 10.8.128.110:6800/14467 51 ==== osd_op_reply(564 notify.4 [watch ping cookie 140318669928896 gen 1] v0'0 uv3 ondisk = 0) v7 ==== 128+0+0 (345768585 0 0) 0x7f9d000009e0 con 0x7f9e44012150 -5> 2016-10-21 11:40:16.141429 7f9e54df7700 1 -- 10.8.128.104:0/2466162087 <== osd.7 10.8.128.109:6804/14347 21 ==== osd_op_reply(569 notify.6 [watch ping cookie 140318669933600 gen 1] v0'0 uv1 ondisk = 0) v7 ==== 128+0+0 (3006110947 0 0) 0x7f9d040009e0 con 0x7f9e44016cd0 -4> 2016-10-21 11:40:18.316123 7f9d6affd700 1 ====== starting new request req=0x7f9d6aff7710 ===== -3> 2016-10-21 11:40:18.316150 7f9d6affd700 2 req 1:0.000027::PUT /rgw/::initializing for trans_id = tx000000000000000000001-005809fea2-9807793-default -2> 2016-10-21 11:40:18.316209 7f9d6affd700 2 req 1:0.000086:s3:PUT /rgw/::getting op 1 -1> 2016-10-21 11:40:18.316221 7f9d6affd700 2 req 1:0.000098:s3:PUT /rgw/:create_bucket:authorizing 0> 2016-10-21 11:40:18.498442 7f9d6affd700 -1 *** Caught signal (Aborted) ** in thread 7f9d6affd700 thread_name:radosgw ceph version 10.2.3-8.el7cp (e1d1eac13d734c63e896531428b565fc47d51874) 1: (()+0x57050a) [0x7f9e7110250a] 2: (()+0xf370) [0x7f9e70511370] 3: (gsignal()+0x37) [0x7f9e6fa541d7] 4: (abort()+0x148) [0x7f9e6fa558c8] 5: (__gnu_cxx::__verbose_terminate_handler()+0x165) [0x7f9e70056ab5] 6: (()+0x5ea26) [0x7f9e70054a26] 7: (()+0x5ea53) [0x7f9e70054a53] 8: (()+0x5ec73) [0x7f9e70054c73] 9: (boost::archive::iterators::transform_width<boost::archive::iterators::binary_from_base64<boost::archive::iterators::remove_whitespace<char const*>, char>, 8, 6, char>::fill()+0x459) [0x7f9e7105ef09] 10: (char* std::string::_S_construct<boost::archive::iterators::transform_width<boost::archive::iterators::binary_from_base64<boost::archive::iterators::remove_whitespace<char const*>, char>, 8, 6, char> >(boost::archive::iterators::transform_width<boost::archive::iterators::binary_from_base64<boost::archive::iterators::remove_whitespace<char const*>, char>, 8, 6, char>, boost::archive::iterators::transform_width<boost::archive::iterators::binary_from_base64<boost::archive::iterators::remove_whitespace<char const*>, char>, 8, 6, char>, std::allocator<char> const&, std::input_iterator_tag)+0x60) [0x7f9e7105ef90] 11: (RGW_Auth_S3::authorize_v2(RGWRados*, req_state*)+0x50d) [0x7f9e71054e3d] 12: (RGW_Auth_S3::authorize(RGWRados*, req_state*)+0xa9) [0x7f9e71056d29] 13: (process_request(RGWRados*, RGWREST*, RGWRequest*, RGWStreamIO*, OpsLogSocket*)+0xb9a) [0x7f9e70f6f2aa] 14: (()+0x192b3) [0x7f9e7aa272b3] 15: (()+0x2327f) [0x7f9e7aa3127f] 16: (()+0x25298) [0x7f9e7aa33298] 17: (()+0x7dc5) [0x7f9e70509dc5] 18: (clone()+0x6d) [0x7f9e6fb1673d]
Updated by Casey Bodley over 7 years ago
- Related to Bug #17544: rgw: ldap: protect rgw::from_base64 from non-base64 input added
Updated by Matt Benjamin over 7 years ago
PR https://github.com/ceph/ceph/pull/10777 fixes the issue on master.
Updated by Matt Benjamin over 7 years ago
- Status changed from New to Pending Backport
Updated by Loïc Dachary over 7 years ago
- Copied to Backport #17785: jewel: ldap: unhandled exception from rgw::from_base64() in RGW_Auth_S3::authorize_v2() added
Updated by Nathan Cutler about 7 years ago
- Status changed from Pending Backport to Resolved
Actions