[RTEMS Project] #4629: shell: Potential stack corruption in rtems_shell_init()

RTEMS trac trac at rtems.org
Tue Mar 15 06:11:35 UTC 2022


#4629: shell: Potential stack corruption in rtems_shell_init()
-----------------------------+------------------------------
 Reporter:  Sebastian Huber  |       Owner:  Sebastian Huber
     Type:  defect           |      Status:  assigned
 Priority:  normal           |   Milestone:  6.1
Component:  shell            |     Version:
 Severity:  normal           |  Resolution:
 Keywords:                   |  Blocked By:
 Blocking:                   |
-----------------------------+------------------------------
Description changed by Sebastian Huber:

Old description:

> The rtems_shell_init() passes the address of a stack variable to
> rtems_shell_run(). If wait == false, then the stack variable goes out of
> scope but may be accessed by the created shell thread.

New description:

 The rtems_shell_init() passes the address of a stack variable (exit_code)
 to rtems_shell_run(). If wait == false, then the stack variable goes out
 of scope but may be accessed by the created shell thread.

--

--
Ticket URL: <http://devel.rtems.org/ticket/4629#comment:1>
RTEMS Project <http://www.rtems.org/>
RTEMS Project


More information about the bugs mailing list