]> git.ipfire.org Git - thirdparty/glibc.git/commit
BZ #15754: CVE-2013-4788
authorCarlos O'Donell <carlos@redhat.com>
Mon, 23 Sep 2013 04:52:09 +0000 (00:52 -0400)
committerAdhemerval Zanella <azanella@linux.vnet.ibm.com>
Fri, 15 Nov 2013 17:42:22 +0000 (11:42 -0600)
commit19a903fb37a199ee7d11f7cff9b7fd90c8b67e32
treead50a6ac08b6a197c559df1218169ef0d71c13b4
parent4415a70617fdc4a47a6302f69b943c9c51ae8cac
BZ #15754: CVE-2013-4788

The pointer guard used for pointer mangling was not initialized for
static applications resulting in the security feature being disabled.
The pointer guard is now correctly initialized to a random value for
static applications. Existing static applications need to be
recompiled to take advantage of the fix.

The test tst-ptrguard1-static and tst-ptrguard1 add regression
coverage to ensure the pointer guards are sufficiently random
and initialized to a default value.
19 files changed:
ChangeLog
NEWS
csu/libc-start.c
elf/Makefile
elf/tst-ptrguard1-static.c [new file with mode: 0644]
elf/tst-ptrguard1.c [new file with mode: 0644]
ports/ChangeLog.ia64
ports/ChangeLog.tile
ports/sysdeps/ia64/stackguard-macros.h
ports/sysdeps/tile/stackguard-macros.h
sysdeps/generic/stackguard-macros.h
sysdeps/i386/stackguard-macros.h
sysdeps/powerpc/powerpc32/stackguard-macros.h
sysdeps/powerpc/powerpc64/stackguard-macros.h
sysdeps/s390/s390-32/stackguard-macros.h
sysdeps/s390/s390-64/stackguard-macros.h
sysdeps/sparc/sparc32/stackguard-macros.h
sysdeps/sparc/sparc64/stackguard-macros.h
sysdeps/x86_64/stackguard-macros.h