]> git.ipfire.org Git - thirdparty/glibc.git/commit
BZ #15754: CVE-2013-4788
authorCarlos O'Donell <carlos@redhat.com>
Mon, 23 Sep 2013 04:52:09 +0000 (00:52 -0400)
committerAllan McRae <allan@archlinux.org>
Fri, 25 Oct 2013 13:56:33 +0000 (23:56 +1000)
commitf03cfdf9bf62f776338171fe2ba6eebbf8948875
treeac395dd9877a717a0b4acb00ea9998ff4479d318
parent6957bcb15456b5118c44bb49754b199462336639
BZ #15754: CVE-2013-4788

The pointer guard used for pointer mangling was not initialized for
static applications resulting in the security feature being disabled.
The pointer guard is now correctly initialized to a random value for
static applications. Existing static applications need to be
recompiled to take advantage of the fix.

The test tst-ptrguard1-static and tst-ptrguard1 add regression
coverage to ensure the pointer guards are sufficiently random
and initialized to a default value.

Conflicts:
NEWS
ports/ChangeLog.ia64
ports/ChangeLog.tile
18 files changed:
ChangeLog
csu/libc-start.c
elf/Makefile
elf/tst-ptrguard1-static.c [new file with mode: 0644]
elf/tst-ptrguard1.c [new file with mode: 0644]
ports/ChangeLog.ia64
ports/ChangeLog.tile
ports/sysdeps/ia64/stackguard-macros.h
ports/sysdeps/tile/stackguard-macros.h
sysdeps/generic/stackguard-macros.h
sysdeps/i386/stackguard-macros.h
sysdeps/powerpc/powerpc32/stackguard-macros.h
sysdeps/powerpc/powerpc64/stackguard-macros.h
sysdeps/s390/s390-32/stackguard-macros.h
sysdeps/s390/s390-64/stackguard-macros.h
sysdeps/sparc/sparc32/stackguard-macros.h
sysdeps/sparc/sparc64/stackguard-macros.h
sysdeps/x86_64/stackguard-macros.h