]> git.ipfire.org Git - thirdparty/glibc.git/blobdiff - ChangeLog
nptl: Open libgcc.so with RTLD_NOW during pthread_cancel [BZ #22636]
[thirdparty/glibc.git] / ChangeLog
index 01a1e99d8359bd60544749aa6fa3eda20d774fbb..48292d6bf05e4111ed31f7c1154b50edebf396aa 100644 (file)
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,105 @@
+2018-01-10  Florian Weimer  <fweimer@redhat.com>
+
+       [BZ #22636]
+       * sysdeps/nptl/unwind-forcedunwind.c (pthread_cancel_init): Open
+       libgcc.so with RTLD_NOW, to avoid lazy binding during unwind.
+
+2018-01-08  Szabolcs Nagy  <szabolcs.nagy@arm.com>
+
+       [BZ #22637]
+       * nptl/descr.h (stackblock, stackblock_size): Update comments.
+       * nptl/allocatestack.c (allocate_stack): Add guardsize to stacksize.
+       * nptl/nptl-init.c (__pthread_get_minstack): Remove guardsize from
+       stacksize.
+       * nptl/pthread_getattr_np.c (pthread_getattr_np): Likewise.
+
+2018-05-23  Andreas Schwab  <schwab@suse.de>
+
+       [BZ #23196]
+       CVE-2018-11237
+       * sysdeps/x86_64/multiarch/memmove-avx512-no-vzeroupper.S
+       (L(preloop_large)): Save initial destination pointer in %r11 and
+       use it instead of %rax after the loop.
+       * string/test-mempcpy.c (MIN_PAGE_SIZE): Define.
+
+2018-05-09  Paul Pluzhnikov  <ppluzhnikov@google.com>
+
+       [BZ #22786]
+       CVE-2018-11236
+       * stdlib/canonicalize.c (__realpath): Fix overflow in path length
+       computation.
+       * stdlib/Makefile (test-bz22786): New test.
+       * stdlib/test-bz22786.c: New test.
+
+2018-03-23  Andrew Senkevich  <andrew.senkevich@intel.com>
+           Max Horn  <max@quendi.de>
+
+       [BZ #22644]
+       CVE-2017-18269
+       * sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S: Fixed
+       branch conditions.
+       * string/test-memmove.c (do_test2): New testcase.
+
+2018-09-06  Stefan Liebler  <stli@linux.ibm.com>
+
+       * sysdeps/unix/sysv/linux/spawni.c (maybe_script_execute):
+       Increment size of new_argv by one.
+
+2018-01-19  H.J. Lu  <hongjiu.lu@intel.com>
+
+       [BZ #22715]
+       * sysdeps/x86_64/dl-trampoline.h (_dl_runtime_profile): Properly
+       align La_x86_64_retval to VEC_SIZE.
+
+2017-12-30  Aurelien Jarno  <aurelien@aurel32.net>
+           Dmitry V. Levin  <ldv@altlinux.org>
+
+       [BZ #22625]
+       * elf/dl-load.c (fillin_rpath): Check for empty tokens before dynamic
+       string token expansion. Check for NULL pointer or empty string possibly
+       returned by expand_dynamic_string_token.
+       (decompose_rpath): Check for empty path after dynamic string
+       token expansion.
+
+2017-12-18  Dmitry V. Levin  <ldv@altlinux.org>
+
+       [BZ #22627]
+       * elf/dl-load.c (_dl_init_paths): Remove _dl_dst_substitute preparatory
+       code and invocation.
+
+2017-12-14  Florian Weimer  <fweimer@redhat.com>
+
+       [BZ #22607]
+       CVE-2017-1000409
+       * elf/dl-load.c (_dl_init_paths): Compute number of components in
+       the expanded path string.
+
+2017-12-14  Florian Weimer  <fweimer@redhat.com>
+
+       [BZ #22606]
+       CVE-2017-1000408
+       * elf/dl-load.c (system_dirs): Update comment.
+       (nsystem_dirs_len): Use array_length.
+       (_dl_init_paths): Use nsystem_dirs_len to compute the array size.
+
+2017-11-02  Florian Weimer  <fweimer@redhat.com>
+
+       Add array_length and array_end macros.
+       * include/array_length.h: New file.
+
+2017-11-02  Florian Weimer  <fweimer@redhat.com>
+
+       [BZ #22332]
+       * posix/tst-glob-tilde.c (do_noescape): New variable.
+       (one_test): Process it.
+       (do_test): Set do_noescape.  Add unescaping test case.
+
+2017-10-22  Paul Eggert <eggert@cs.ucla.edu>
+
+       [BZ #22332]
+       * posix/glob.c (__glob): Fix buffer overflow during GLOB_TILDE
+       unescaping.
+
 2017-10-21  Florian Weimer  <fweimer@redhat.com>
 
        * posix/Makefile (tests): Add tst-glob-tilde.