diff options
author | Pedro Alves <palves@redhat.com> | 2013-03-07 09:47:57 +0000 |
---|---|---|
committer | Pedro Alves <palves@redhat.com> | 2013-03-07 09:47:57 +0000 |
commit | f0ae6fc35c1c1e21a19e5f19f0177858ea180771 (patch) | |
tree | 5a82927e5a55635d7217794bd07afdf9f5d33456 /gdb/utils.c | |
parent | 02e60bf7bab71c3850f2b525db079a0309140689 (diff) | |
download | binutils-f0ae6fc35c1c1e21a19e5f19f0177858ea180771.zip binutils-f0ae6fc35c1c1e21a19e5f19f0177858ea180771.tar.gz binutils-f0ae6fc35c1c1e21a19e5f19f0177858ea180771.tar.bz2 |
PR gdb/15236: gdbserver write to linux memory with zero length corrupts stack
PROBLEM:
The function linux_write_memory () in linux-low.c allocates a buffer
on the stack to hold a copy of the data to be written.
register PTRACE_XFER_TYPE *buffer = (PTRACE_XFER_TYPE *)
alloca (count * sizeof (PTRACE_XFER_TYPE));
"count" is the number of bytes to be written, rounded up to the
nearest multiple of sizeof (PTRACE_XFER_TYPE) and allowing for not
being an aligned address. The function later uses
buffer[0] = ptrace (PTRACE_PEEKTEXT, pid,
(PTRACE_ARG3_TYPE) (uintptr_t) addr, 0);
The problem is that this function can be called to write zero bytes on
an aligned address, for example when receiving an X packet of length 0
(used to test if 8-bit write is supported). Under these circumstances,
count can be zero.
Since in this case, buffer[0] may never have been allocated, the stack
is corrupted and gdbserver may crash.
SOLUTION:
Writing zero bytes should always succeed. The patch below returns
successfully early if the length is zero, so avoiding the stack
corruption.
Verified on the ARC GDB 7.5.1 port.
2013-03-07 Jeremy Bennett <jeremy.bennett@embecosm.com>
PR server/15236
* linux-low.c (linux_write_memory): Return early success if LEN is
zero.
Diffstat (limited to 'gdb/utils.c')
0 files changed, 0 insertions, 0 deletions