This is the mail archive of the
glibc-bugs@sourceware.org
mailing list for the glibc project.
[Bug libc/20468] SIGSEGV in internal_getent on arm64 xenial
- From: "sokoow at gmail dot com" <sourceware-bugzilla at sourceware dot org>
- To: glibc-bugs at sourceware dot org
- Date: Sun, 14 Aug 2016 17:21:50 +0000
- Subject: [Bug libc/20468] SIGSEGV in internal_getent on arm64 xenial
- Auto-submitted: auto-generated
- References: <bug-20468-131@http.sourceware.org/bugzilla/>
https://sourceware.org/bugzilla/show_bug.cgi?id=20468
--- Comment #3 from sokoow at gmail dot com ---
(gdb) exploitable
Description: Possible stack corruption
Short description: PossibleStackCorruption (7/22)
Hash: 53cccb5fca1ac9c28753e048e8e80a2b.b10f33ef51e6df44f22c86083d6f159d
Exploitability Classification: EXPLOITABLE
Explanation: GDB generated an error while unwinding the stack and/or the stack
contained return addresses that were not mapped in the inferior's process
address space and/or the stack pointer is pointing to a location outside the
default stack region. These conditions likely indicate stack corruption, which
is generally considered exploitable.
Other tags: DestAvNearNull (15/22), AccessViolation (21/22)
--
You are receiving this mail because:
You are on the CC list for the bug.