ntdll: Zero fl.l_pid field in user space before reading from it.
Alexandre Julliard
julliard at winehq.org
Fri Oct 4 15:13:03 CDT 2019
Jefferson Carpenter <jeffersoncarpenter2 at gmail.com> writes:
> When this code path is hit, memory sanitizers such as valgrind
> currently report an uninitialized read at fl.l_pid. This is most
> likely because the value is set in kernel space, which is
> out-of-bounds to user-space programs. This patch clears up that
> output, and ensures that there will not be a memory vulnerability even
> in the event that the kernel does not set l_pid (notwithstanding that
> POSIX specifies it should).
It would be better to fix valgrind.
--
Alexandre Julliard
julliard at winehq.org
More information about the wine-devel
mailing list