diff options
author | Carlos O'Donell <carlos@redhat.com> | 2013-09-23 00:52:09 -0400 |
---|---|---|
committer | Carlos O'Donell <carlos@redhat.com> | 2013-09-23 00:52:09 -0400 |
commit | c61b4d41c9647a54a329aa021341c0eb032b793e (patch) | |
tree | c4a665c232a7d37786a6f3b5e3f56d0ae11480e8 /ChangeLog | |
parent | 58a96064d193317236b740998e134b652d3d62ad (diff) | |
download | glibc-c61b4d41c9647a54a329aa021341c0eb032b793e.tar.gz glibc-c61b4d41c9647a54a329aa021341c0eb032b793e.tar.xz glibc-c61b4d41c9647a54a329aa021341c0eb032b793e.zip |
BZ #15754: CVE-2013-4788
The pointer guard used for pointer mangling was not initialized for static applications resulting in the security feature being disabled. The pointer guard is now correctly initialized to a random value for static applications. Existing static applications need to be recompiled to take advantage of the fix. The test tst-ptrguard1-static and tst-ptrguard1 add regression coverage to ensure the pointer guards are sufficiently random and initialized to a default value.
Diffstat (limited to 'ChangeLog')
-rw-r--r-- | ChangeLog | 30 |
1 files changed, 30 insertions, 0 deletions
diff --git a/ChangeLog b/ChangeLog index 4282494032..5972ae01f9 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,3 +1,33 @@ +2013-09-23 Carlos O'Donell <carlos@redhat.com> + + [BZ #15754] + * elf/Makefile (tests): Add tst-ptrguard1. + (tests-static): Add tst-ptrguard1-static. + (tst-ptrguard1-ARGS): Define. + (tst-ptrguard1-static-ARGS): Define. + * elf/tst-ptrguard1.c: New file. + * elf/tst-ptrguard1-static.c: New file. + * sysdeps/x86_64/stackguard-macros.h: Define POINTER_CHK_GUARD. + * sysdeps/i386/stackguard-macros.h: Likewise. + * sysdeps/powerpc/powerpc32/stackguard-macros.h: Likewise. + * sysdeps/powerpc/powerpc64/stackguard-macros.h: Likewise. + * sysdeps/s390/s390-32/stackguard-macros.h: Likewise. + * sysdeps/s390/s390-64/stackguard-macros.h: Likewise. + * sysdeps/sparc/sparc32/stackguard-macros.h: Likewise. + * sysdeps/sparc/sparc64/stackguard-macros.h: Likewise. + +2013-09-23 Hector Marco <hecmargi@upv.es> + Ismael Ripoll <iripoll@disca.upv.es> + Carlos O'Donell <carlos@redhat.com> + + [BZ #15754] + * sysdeps/generic/stackguard-macros.h: Define + __pointer_chk_guard_local and POINTER_CHK_GUARD. + * csu/libc-start.c [!SHARED && !THREAD_SET_POINTER_GUARD]: + Define __pointer_chk_guard_local. + (LIBC_START_MAIN) [!SHARED]: Call _dl_setup_pointer_guard. + Use THREAD_SET_POINTER_GUARD or set __pointer_chk_guard_local. + 2013-09-15 Vinitha Vijayan <vinitha.vijayann@gmail.com> [BZ #15859] |