about summary refs log tree commit diff
Commit message (Collapse)AuthorAgeFilesLines
* Fix stack overflow due to large AF_INET6 requests archlinux/2.18/masterSiddhesh Poyarekar2013-10-252-2/+24
| | | | | | | | | | | | | Resolves #16072 (CVE-2013-4458). This patch fixes another stack overflow in getaddrinfo when it is called with AF_INET6. The AF_UNSPEC case was fixed as CVE-2013-1914, but the AF_INET6 case went undetected back then. (cherry picked from commit 7cbcdb3699584db8913ca90f705d6337633ee10f) Conflicts: NEWS
* Fix incorrect getaddrinfo assertion triggerAllan McRae2013-10-252-3/+18
| | | | | | | | | | | | | | | | | | | | | [BZ #9954] With the following /etc/hosts: 127.0.0.1 www.my-domain.es 127.0.1.1 www.my-domain.es 192.168.0.1 www.my-domain.es Using getaddrinfo() on www.my-domain.es, trigger the following assertion: ../sysdeps/posix/getaddrinfo.c:1473: rfc3484_sort: Assertion `src->results[i].native == -1 || src->results[i].native == a1_native' failed. This is due to two different bugs: - In rfc3484_sort() rule 7, src->results[i].native is assigned even if src->results[i].index is -1, meaning that no interface is associated. - In getaddrinfo() the source IP address used with the lo interface needs a special case, as it can be any IP within 127.X.Y.Z. (cherry picked from commit 894f3f1049135dcbeaab8f18690973663ef3147c)
* BZ #15754: Fix test case for ARM.Carlos O'Donell2013-10-253-1/+16
| | | | | | | Statically built binaries use __pointer_chk_guard_local, while dynamically built binaries use __pointer_chk_guard. Provide the right definition depending on the test case we are building.
* BZ #15754: CVE-2013-4788Carlos O'Donell2013-10-2518-2/+342
| | | | | | | | | | | | | | | | | The pointer guard used for pointer mangling was not initialized for static applications resulting in the security feature being disabled. The pointer guard is now correctly initialized to a random value for static applications. Existing static applications need to be recompiled to take advantage of the fix. The test tst-ptrguard1-static and tst-ptrguard1 add regression coverage to ensure the pointer guards are sufficiently random and initialized to a default value. Conflicts: NEWS ports/ChangeLog.ia64 ports/ChangeLog.tile
* Check for integer overflow in cache size computation in strcollSiddhesh Poyarekar2013-10-254-1/+80
| | | | | | | | | | | | | | | | strcoll is implemented using a cache for indices and weights of collation sequences in the strings so that subsequent passes do not have to search through collation data again. For very large string inputs, the cache size computation could overflow. In such a case, use the fallback function that does not cache indices and weights of collation sequences. Fixes CVE-2012-4412. (cherry picked from commit 303e567a8062200dc06acde7c76fc34679f08d8f) Conflicts: NEWS
* Fall back to non-cached sequence traversal and comparison on malloc failSiddhesh Poyarekar2013-10-252-31/+244
| | | | | | | | | | | | | strcoll currently falls back to alloca if malloc fails, resulting in a possible stack overflow. This patch implements sequence traversal and comparison without caching indices and rules. Fixes CVE-2012-4424. (cherry picked from commit 141f3a77fe4f1b59b0afa9bf6909cd2000448883) Conflicts: NEWS
* Simplify strcoll implementationSiddhesh Poyarekar2013-10-252-406/+304
| | | | | | | Break up strcoll into simpler functions so that the logic is easier to follow and maintain. (cherry picked from commit 1326ba1af22068db9488c2328bdaf852b8a93dcf)
* malloc: Check for integer overflow in memalign.Will Newton2013-10-252-0/+13
| | | | | | | | | | | | | | | | A large bytes parameter to memalign could cause an integer overflow and corrupt allocator internals. Check the overflow does not occur before continuing with the allocation. ChangeLog: 2013-09-11 Will Newton <will.newton@linaro.org> [BZ #15857] * malloc/malloc.c (__libc_memalign): Check the value of bytes does not overflow. (cherry picked from commit b73ed247781d533628b681f57257dc85882645d3)
* malloc: Check for integer overflow in valloc.Will Newton2013-10-252-0/+13
| | | | | | | | | | | | | | | | A large bytes parameter to valloc could cause an integer overflow and corrupt allocator internals. Check the overflow does not occur before continuing with the allocation. ChangeLog: 2013-09-11 Will Newton <will.newton@linaro.org> [BZ #15856] * malloc/malloc.c (__libc_valloc): Check the value of bytes does not overflow. (cherry picked from commit 55e17aadc1ef17a1df9626fb0e9fba290ece3331)
* malloc: Check for integer overflow in pvalloc.Will Newton2013-10-252-0/+13
| | | | | | | | | | | | | | | | A large bytes parameter to pvalloc could cause an integer overflow and corrupt allocator internals. Check the overflow does not occur before continuing with the allocation. ChangeLog: 2013-09-11 Will Newton <will.newton@linaro.org> [BZ #15855] * malloc/malloc.c (__libc_pvalloc): Check the value of bytes does not overflow. (cherry picked from commit 1159a193696ad48ec86e5895f6dee3e539619c0e)
* CVE-2013-4237, BZ #14699: Buffer overflow in readdir_rFlorian Weimer2013-10-259-34/+118
| | | | | | | | | | | | | | | | | | | | | | | | | * sysdeps/posix/dirstream.h (struct __dirstream): Add errcode member. * sysdeps/posix/opendir.c (__alloc_dir): Initialize errcode member. * sysdeps/posix/rewinddir.c (rewinddir): Reset errcode member. * sysdeps/posix/readdir_r.c (__READDIR_R): Enforce NAME_MAX limit. Return delayed error code. Remove GETDENTS_64BIT_ALIGNED conditional. * sysdeps/unix/sysv/linux/wordsize-64/readdir_r.c: Do not define GETDENTS_64BIT_ALIGNED. * sysdeps/unix/sysv/linux/i386/readdir64_r.c: Likewise. * manual/filesys.texi (Reading/Closing Directory): Document ENAMETOOLONG return value of readdir_r. Recommend readdir more strongly. * manual/conf.texi (Limits for Files): Add portability note to NAME_MAX, PATH_MAX. (Pathconf): Add portability note for _PC_NAME_MAX, _PC_PATH_MAX. (cherry picked from commit 91ce40854d0b7f865cf5024ef95a8026b76096f3) Conflicts: NEWS
* HACK FIX: reinline __m128i_strloaduAllan McRae2013-08-191-1/+1
| | | | | | | | | | After f1d70dad, glibc build for i686-pc-linux-gnu with -O2 experiences sefaults in __strstr_sse42. https://bugs.archlinux.org/task/36556 http://sourceware.org/bugzilla/show_bug.cgi?id=15845 Readding the inline "fixes" the issue until a correct solution is found.
* Update version.h and include/features.h for 2.18 release. glibc-2.18David S. Miller2013-08-102-3/+3
|
* Fix typo in ChangeLogAndreas Schwab2013-08-061-1/+1
|
* Update Korean translations.David S. Miller2013-08-032-1143/+1342
| | | | * po/ko.po: Update Korean translation from translation project.
* Update manual/contrib.texiDavid S. Miller2013-08-012-1/+21
| | | | | | * manual/contrib.texi: Update entry for Siddhesh Poyarekar. Add entries for Will Newton, Andi Kleen, David Holsgrove, and Ondrej Bilka.
* Update French translations.David S. Miller2013-07-302-934/+972
| | | | * po/fr.po: Update French translation from translation project.
* Update Czech translations.David S. Miller2013-07-282-937/+972
| | | | * po/cs.po: Update Czech translation from translation project.
* Update Swedish translations.David S. Miller2013-07-282-935/+973
| | | | * po/sv.po: Update Swedish translation from translation project.
* Update Esperanto translations.David S. Miller2013-07-272-1020/+1054
| | | | * po/eo.po: Update Esperanto translation from translation project.
* Update Vietnamese translations.David S. Miller2013-07-272-992/+1029
| | | | * po/vi.po: Update Vietnamese translation from translation project.
* Update German translations.David S. Miller2013-07-272-933/+971
| | | | * po/de.po: Update German translation from translation project.
* Update Bulgarian translations.David S. Miller2013-07-262-946/+982
| | | | * po/bg.po: Update Bulgarian translation from translation project.
* Update Dutch, Polish, and Russian translations.David S. Miller2013-07-264-2819/+2927
| | | | | | * po/nl.po: Update Dutch translation from translation project. * po/pl.po: Update Polish translation from translation project. * po/ru.po: Update Russian translation from translation project.
* [AArch64] Provide symbol version for _mcount.Marcus Shawcroft2013-07-265-0/+81
|
* Update libc.pot in preparation for giving tarball to translation project.David S. Miller2013-07-252-930/+968
| | | | * po/libc.pot: Update.
* Added NEWS entries for AT_HWCAP2 and POWER8 enablement.Ryan S. Arnold2013-07-251-0/+5
|
* hppa: Regenerate libm-test-ulps.Carlos O'Donell2013-07-232-0/+43
|
* Remove Linux kernel version ambiguity in comment added by previous commit.David S. Miller2013-07-232-2/+6
| | | | * tst-cancel4.c (WRITE_BUFFER_SIZE): Adjust comment.
* PowerPC: use _dl_static_init to set GLRO(gl_pagesize)Adhemerval Zanella2013-07-235-0/+137
| | | | | | This patch fixes dlfcn/tststatic5 for PowerPC where pagesize variable was not properly initialized in certain cases. This patch is based on other architecture code.
* Increase nptl test case buffer size so we really block on current Linux kernels.David S. Miller2013-07-232-1/+28
| | | | * tst-cancel4.c (WRITE_BUFFER_SIZE): Increase to 16384.
* tile BZ #15759: Fix bug in _dl_unmapChris Metcalf2013-07-223-4/+17
| | | | | | We returned without calling __munmap if not in the simulator. Now we call a separate sim_dlclose() function to make the control flow work correctly.
* S/390: ULPs update.Andreas Krebbel2013-07-222-141/+6289
|
* CVE-2013-2207, BZ #15755: Disable pt_chown.Carlos O'Donell2013-07-2111-7/+100
| | | | | | | | | | | | | | | | | | | | | | | The helper binary pt_chown tricked into granting access to another user's pseudo-terminal. Pre-conditions for the attack: * Attacker with local user account * Kernel with FUSE support * "user_allow_other" in /etc/fuse.conf * Victim with allocated slave in /dev/pts Using the setuid installed pt_chown and a weak check on whether a file descriptor is a tty, an attacker could fake a pty check using FUSE and trick pt_chown to grant ownership of a pty descriptor that the current user does not own. It cannot access /dev/pts/ptmx however. In most modern distributions pt_chown is not needed because devpts is enabled by default. The fix for this CVE is to disable building and using pt_chown by default. We still provide a configure option to enable hte use of pt_chown but distributions do so at their own risk.
* Update Sparc ULPs.David S. Miller2013-07-202-0/+10
| | | | | * sysdeps/sparc/fpu/libm-test-ulps: Update ULPs to handle minor difference between 32-bit and 64-bit.
* m68k: use _dl_static_init to set GLR0(dl_pagesize)Andreas Schwab2013-07-215-2/+134
|
* tile: add missing semicolon in <bits/ptrace.h>Chris Metcalf2013-07-192-1/+6
| | | | | | Change 521c6785e1fc94d added the enum but missed the semicolon. Signed-off-by: Chris Metcalf <cmetcalf@tilera.com>
* Clean up whitespace in lock elision patches.Dominik Vogt2013-07-1915-31/+52
| | | | Signed-off-by: Carlos O'Donell <carlos@redhat.com>
* Remove remains of rwlock elision which is not implemented yet.Dominik Vogt2013-07-193-11/+8
| | | | | | | | | | | | | | | Signed-off-by: Carlos O'Donell <carlos@redhat.com> --- nptl/ 2013-07-19 Dominik Vogt <vogt@de.ibm.com> * sysdeps/unix/sysv/linux/x86/elision-conf.c: Remove __rwlock_rtm_enabled and __rwlock_rtm_read_retries. (elision_init): Don't set __rwlock_rtm_enabled. * sysdeps/unix/sysv/linux/x86/elision-conf.h: Remove __rwlock_rtm_enabled.
* BZ #15711: Avoid circular dependency for syscall.hCarlos O'Donell2013-07-163-3/+17
| | | | | | | | | | | | | | | | | | The generated header is compiled with `-ffreestanding' to avoid any circular dependencies against the installed implementation headers. Such a dependency would require the implementation header to be installed before the generated header could be built (See bug 15711). In current practice the generated header dependencies do not include any of the implementation headers removed by the use of `-ffreestanding'. --- 2013-07-15 Carlos O'Donell <carlos@redhat.com> [BZ #15711] * sysdeps/unix/sysv/linux/Makefile ($(objpfx)bits/syscall%h): Avoid system header dependency with -ffreestanding. ($(objpfx)bits/syscall%d): Likewise.
* Annotate more cases of math bug 15319.David S. Miller2013-07-132-16/+26
| | | | | | * math/libm-test.inc (casin_test_data): Annotate more cases of missing underflows from atanl/atan2l due to bug 15319. (casinh_test_data): Likewise.
* [AArch64] Adding -funwind-tables to backtrace.cMarcus Shawcroft2013-07-122-0/+8
|
* [AArch64] Use _dl_static_init to set GLR0(dl_pagesize)Marcus Shawcroft2013-07-095-0/+136
|
* Full from-scratch rebuild of sparc ULPs.David S. Miller2013-07-072-238/+77
| | | | * sysdeps/sparc/fpu/libm-test-ulps: Regenerate from scratch.
* tile: use _dl_static_init to set GLRO(gl_pagesize)Chris Metcalf2013-07-075-0/+134
| | | | | | A recently-added test (dlfcn/tststatic5) pointed out that tile was not properly initializing the variable pagesize in certain cases. This change just copies the existing code from MIPS.
* tile: update libm-test-ulps from scratchChris Metcalf2013-07-072-129/+2797
|
* tile: use soft-fp for fma() and fmaf()Chris Metcalf2013-07-074-8/+105
| | | | | | The sfp-machine.h is based on the gcc version, but extended with required new macros by comparison with other architectures and by investigating the hardware support for FP on tile.
* Update x86 and x86_64 ulps on AMD FX-8350 with GCC 4.8.1.Jeroen Albers2013-07-053-16/+528
|
* [AArch64] Regenerate libm-test-ulpsMarcus Shawcroft2013-07-052-0/+50
|
* Fix lock elision help text in INSTALL and configureSiddhesh Poyarekar2013-07-044-4/+9
|