Package: valgrind
Version: 1:3.3.1-2
Severity: normal

When valgrind loads a PIE executable, it maps the executable at
address 0x0 in the address space.

For example, doing:
   $ valgrind /lib/ld-2.7.so /bin/cat /proc/self/maps

shows that valgrind is mapping /lib/ld-2.7.so at address 0x0:
00000000-0001a000 r-xp 00000000 03:03 8654965    /lib/ld-2.7.so
0001a000-0001c000 rw-p 0001a000 03:03 8654965    /lib/ld-2.7.so

This prevents NULL pointer derefences from being detected.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.25-2-686 (SMP w/2 CPU cores)
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/bash

Versions of packages valgrind depends on:
ii  libc6                         2.7-13     GNU C Library: Shared libraries

Versions of packages valgrind recommends:
ii  gdb                           6.8-3      The GNU Debugger

Versions of packages valgrind suggests:
pn  alleyoop                      <none>     (no description available)
pn  kcachegrind                   <none>     (no description available)
ii  libc6-dbg                     2.7-13     GNU C Library: Libraries with debu

-- no debconf information



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to