ntdll: Zero fl.l_pid field in user space before reading from it.

Jefferson Carpenter jeffersoncarpenter2 at gmail.com
Fri Oct 4 01:42:47 CDT 2019


When this code path is hit, memory sanitizers such as valgrind
currently report an uninitialized read at fl.l_pid.  This is most
likely because the value is set in kernel space, which is
out-of-bounds to user-space programs.  This patch clears up that
output, and ensures that there will not be a memory vulnerability even
in the event that the kernel does not set l_pid (notwithstanding that
POSIX specifies it should).

- Jefferson
-------------- next part --------------
A non-text attachment was scrubbed...
Name: 0001-ntdll-Zero-fl.l_pid-field-in-user-space-before-readi.patch
Type: text/x-patch
Size: 821 bytes
Desc: not available
URL: <http://www.winehq.org/pipermail/wine-devel/attachments/20191004/bf5dacd7/attachment.bin>


More information about the wine-devel mailing list