Red Hat Bugzilla – Bug 193763
Buffer overrun in add_minsym_members
Last modified: 2015-01-07 19:12:49 EST
Description of problem: String buffer overflow
(allocation fails to include room for trailing '\0')
Version-Release number of selected component (if applicable):
In ddd (gdb console) type
glibc detected memory corruption in free.
The maximum extra size of the string should be 10, not 9.
I calculate it as sizeof("'::base$(")+1.
Created attachment 130337 [details]
Correctly calculate size of string to allocate
Patch confirmed as required and valid - for Red Hat patch
gdb-6.3-linespec-20041213.patch (CVS release 1.2).
Patch still needed for RPM built on top of "gdb-188.8.131.5260725-cvs".
Upstream "gdb-184.108.40.20660725-cvs" is not affected by this Bug.
QE ack for 4.5.
This request was evaluated by Red Hat Product Management for inclusion in a Red
Hat Enterprise Linux maintenance release. Product Management has requested
further review of this request by Red Hat Engineering, for potential
inclusion in a Red Hat Enterprise Linux Update release for currently deployed
products. This request is not yet committed for inclusion in an Update
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.