[RTEMS Project] #4629: shell: Potential stack corruption in rtems_shell_init()
RTEMS trac
trac at rtems.org
Tue Mar 15 06:11:35 UTC 2022
#4629: shell: Potential stack corruption in rtems_shell_init()
-----------------------------+------------------------------
Reporter: Sebastian Huber | Owner: Sebastian Huber
Type: defect | Status: assigned
Priority: normal | Milestone: 6.1
Component: shell | Version:
Severity: normal | Resolution:
Keywords: | Blocked By:
Blocking: |
-----------------------------+------------------------------
Description changed by Sebastian Huber:
Old description:
> The rtems_shell_init() passes the address of a stack variable to
> rtems_shell_run(). If wait == false, then the stack variable goes out of
> scope but may be accessed by the created shell thread.
New description:
The rtems_shell_init() passes the address of a stack variable (exit_code)
to rtems_shell_run(). If wait == false, then the stack variable goes out
of scope but may be accessed by the created shell thread.
--
--
Ticket URL: <http://devel.rtems.org/ticket/4629#comment:1>
RTEMS Project <http://www.rtems.org/>
RTEMS Project
More information about the bugs
mailing list