diff options
author | mark@chromium.org <mark@chromium.org> | 2015-02-05 23:01:31 +0000 |
---|---|---|
committer | mark@chromium.org <mark@chromium.org> | 2015-02-05 23:01:31 +0000 |
commit | 3b7262b0ee785bef06d3e458cb13c736fc0b8da8 (patch) | |
tree | 7f96d812bedeefe736120ae87d6f72f059714bd1 /src/client/ios/Breakpad.mm | |
parent | Add unit tests for overlapping functions and externs. (diff) | |
download | breakpad-3b7262b0ee785bef06d3e458cb13c736fc0b8da8.tar.xz |
Fix overflow error in breakpad for linux
A computation in the stack unwind algorithm could cause an overflow if a base
pointer read from crashed process is sufficiently close to top of address space.
This causes a memory read that causes the dump thread to crash, resulting in a
failure to generate crash dump. Check fixed to properly detect that this pointer
is greater than actual memory range of current stack.
Patch by Kyle Joswiak <kjoswiak@chromium.org>
Review URL: https://breakpad.appspot.com/3754003/
git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@1425 4c0a9323-5329-0410-9bdc-e9ce6186880e
Diffstat (limited to 'src/client/ios/Breakpad.mm')
0 files changed, 0 insertions, 0 deletions