I just compiled the latest version on my machine and ran a dumb test -
mpirun without any arguments.
This generated a buffer overflow error!

Error message (reproducible with different mem. addr.s):
[ /home/dave/rpmbuild ] $ mpirun
*** buffer overflow detected ***: mpirun terminated
======= Backtrace: =========
/lib64/libc.so.6(__chk_fail+0x2f)[0x31669dee3f]
/lib64/libc.so.6[0x31669de69b]
/lib64/libc.so.6(__snprintf_chk+0x7b)[0x31669de56b]
/usr/lib64/libopal.so.0(opal_cmd_line_get_usage_msg+0x20a)[0x2aaaaac1088a]
mpirun[0x403c53]
mpirun(orterun+0xa0)[0x402798]
mpirun(main+0x1b)[0x4026f3]
/lib64/libc.so.6(__libc_start_main+0xf4)[0x316691d084]
mpirun[0x402649]
======= Memory map: ========
00400000-00408000 r-xp 00000000 09:01 2697992
/usr/bin/orterun
...
7fff20e92000-7fff20ea8000 rw-p 7fff20e92000 00:00 0
[stack]
ffffffffff600000-ffffffffffe00000 ---p 00000000 00:00 0
[vdso]
Aborted

Installation details: System: FC5 AMD Opteron x86_64
downloaded SRPM version 1.1.1

rpm -ivh /usr/local/src/dist/libs/openmpi-1.1-1.src.rpm
rpmbuild -ba SPECS/openmpi-1.1.spec --target x86_64
- generates an error from check-rpaths stating that the /usr/lib64 prefix
is unnecessary and may cause problems
QA_RPATHS=$[ 0x0001|0x0010 ] rpmbuild -ba SPECS/openmpi-1.1.spec --target
x86_64
- suggessted workaround - ignores as warnings
rpm -ivh ~dave/rpmbuild/RPMS/x86_64/openmpi-1.1-1.x86_64.rpm
- generates a package conflict -- file /usr/lib64/libopal.so from install
of openmpi-1.1-1 conflicts with file from package opal-2.2.1-1
- apparently, this comes from opal, the open phone abstraction library...
so I uninstalled opal
rpm -ivh ~dave/rpmbuild/RPMS/x86_64/openmpi-1.1-1.x86_64.rpm
- worked!

The strange thing is that mpirun with normal arguments works as expected
without any sorts of mem. errors.
mpirun with flags -h or --help also buffer overflows, but not mpirun with an
unrecognized argument, to which it spits out a "you must specify how many
processes to launch, via the -np argument." error.

I hope this gets fixed soon, buffer overflows are potential security
vulnerabilities.

~ David Rogers

Reply via email to