#4629: shell: Potential stack corruption in rtems_shell_init()
-----------------------------+------------------------------
Reporter: Sebastian Huber | Owner: Sebastian Huber
Type: defect | Status: assigned
Priority: normal | Milestone: 6.1
Component: shell | Version:
Severity: normal | Resolution:
Keywords: | Blocked By:
Blocking: |
-----------------------------+------------------------------
Description changed by Sebastian Huber:
Old description:
> The rtems_shell_init() passes the address of a stack variable to
> rtems_shell_run(). If wait == false, then the stack variable goes out of
> scope but may be accessed by the created shell thread.
New description:
The rtems_shell_init() passes the address of a stack variable (exit_code)
to rtems_shell_run(). If wait == false, then the stack variable goes out
of scope but may be accessed by the created shell thread.
--
--
Ticket URL: <http://devel.rtems.org/ticket/4629#comment:1>
RTEMS Project <http://www.rtems.org/>
RTEMS Project
_______________________________________________
bugs mailing list
[email protected]
http://lists.rtems.org/mailman/listinfo/bugs