about summary refs log tree commit diff
path: root/ChangeLog
Commit message (Collapse)AuthorAgeFilesLines
* Fix stack overflow due to large AF_INET6 requests archlinux/2.18/masterSiddhesh Poyarekar2013-10-251-0/+6
| | | | | | | | | | | | | Resolves #16072 (CVE-2013-4458). This patch fixes another stack overflow in getaddrinfo when it is called with AF_INET6. The AF_UNSPEC case was fixed as CVE-2013-1914, but the AF_INET6 case went undetected back then. (cherry picked from commit 7cbcdb3699584db8913ca90f705d6337633ee10f) Conflicts: NEWS
* Fix incorrect getaddrinfo assertion triggerAllan McRae2013-10-251-0/+8
| | | | | | | | | | | | | | | | | | | | | [BZ #9954] With the following /etc/hosts: 127.0.0.1 www.my-domain.es 127.0.1.1 www.my-domain.es 192.168.0.1 www.my-domain.es Using getaddrinfo() on www.my-domain.es, trigger the following assertion: ../sysdeps/posix/getaddrinfo.c:1473: rfc3484_sort: Assertion `src->results[i].native == -1 || src->results[i].native == a1_native' failed. This is due to two different bugs: - In rfc3484_sort() rule 7, src->results[i].native is assigned even if src->results[i].index is -1, meaning that no interface is associated. - In getaddrinfo() the source IP address used with the lo interface needs a special case, as it can be any IP within 127.X.Y.Z. (cherry picked from commit 894f3f1049135dcbeaab8f18690973663ef3147c)
* BZ #15754: Fix test case for ARM.Carlos O'Donell2013-10-251-0/+7
| | | | | | | Statically built binaries use __pointer_chk_guard_local, while dynamically built binaries use __pointer_chk_guard. Provide the right definition depending on the test case we are building.
* BZ #15754: CVE-2013-4788Carlos O'Donell2013-10-251-0/+30
| | | | | | | | | | | | | | | | | The pointer guard used for pointer mangling was not initialized for static applications resulting in the security feature being disabled. The pointer guard is now correctly initialized to a random value for static applications. Existing static applications need to be recompiled to take advantage of the fix. The test tst-ptrguard1-static and tst-ptrguard1 add regression coverage to ensure the pointer guards are sufficiently random and initialized to a default value. Conflicts: NEWS ports/ChangeLog.ia64 ports/ChangeLog.tile
* Check for integer overflow in cache size computation in strcollSiddhesh Poyarekar2013-10-251-0/+8
| | | | | | | | | | | | | | | | strcoll is implemented using a cache for indices and weights of collation sequences in the strings so that subsequent passes do not have to search through collation data again. For very large string inputs, the cache size computation could overflow. In such a case, use the fallback function that does not cache indices and weights of collation sequences. Fixes CVE-2012-4412. (cherry picked from commit 303e567a8062200dc06acde7c76fc34679f08d8f) Conflicts: NEWS
* Fall back to non-cached sequence traversal and comparison on malloc failSiddhesh Poyarekar2013-10-251-0/+10
| | | | | | | | | | | | | strcoll currently falls back to alloca if malloc fails, resulting in a possible stack overflow. This patch implements sequence traversal and comparison without caching indices and rules. Fixes CVE-2012-4424. (cherry picked from commit 141f3a77fe4f1b59b0afa9bf6909cd2000448883) Conflicts: NEWS
* Simplify strcoll implementationSiddhesh Poyarekar2013-10-251-0/+9
| | | | | | | Break up strcoll into simpler functions so that the logic is easier to follow and maintain. (cherry picked from commit 1326ba1af22068db9488c2328bdaf852b8a93dcf)
* malloc: Check for integer overflow in memalign.Will Newton2013-10-251-0/+6
| | | | | | | | | | | | | | | | A large bytes parameter to memalign could cause an integer overflow and corrupt allocator internals. Check the overflow does not occur before continuing with the allocation. ChangeLog: 2013-09-11 Will Newton <will.newton@linaro.org> [BZ #15857] * malloc/malloc.c (__libc_memalign): Check the value of bytes does not overflow. (cherry picked from commit b73ed247781d533628b681f57257dc85882645d3)
* malloc: Check for integer overflow in valloc.Will Newton2013-10-251-0/+6
| | | | | | | | | | | | | | | | A large bytes parameter to valloc could cause an integer overflow and corrupt allocator internals. Check the overflow does not occur before continuing with the allocation. ChangeLog: 2013-09-11 Will Newton <will.newton@linaro.org> [BZ #15856] * malloc/malloc.c (__libc_valloc): Check the value of bytes does not overflow. (cherry picked from commit 55e17aadc1ef17a1df9626fb0e9fba290ece3331)
* malloc: Check for integer overflow in pvalloc.Will Newton2013-10-251-0/+6
| | | | | | | | | | | | | | | | A large bytes parameter to pvalloc could cause an integer overflow and corrupt allocator internals. Check the overflow does not occur before continuing with the allocation. ChangeLog: 2013-09-11 Will Newton <will.newton@linaro.org> [BZ #15855] * malloc/malloc.c (__libc_pvalloc): Check the value of bytes does not overflow. (cherry picked from commit 1159a193696ad48ec86e5895f6dee3e539619c0e)
* CVE-2013-4237, BZ #14699: Buffer overflow in readdir_rFlorian Weimer2013-10-251-0/+22
| | | | | | | | | | | | | | | | | | | | | | | | | * sysdeps/posix/dirstream.h (struct __dirstream): Add errcode member. * sysdeps/posix/opendir.c (__alloc_dir): Initialize errcode member. * sysdeps/posix/rewinddir.c (rewinddir): Reset errcode member. * sysdeps/posix/readdir_r.c (__READDIR_R): Enforce NAME_MAX limit. Return delayed error code. Remove GETDENTS_64BIT_ALIGNED conditional. * sysdeps/unix/sysv/linux/wordsize-64/readdir_r.c: Do not define GETDENTS_64BIT_ALIGNED. * sysdeps/unix/sysv/linux/i386/readdir64_r.c: Likewise. * manual/filesys.texi (Reading/Closing Directory): Document ENAMETOOLONG return value of readdir_r. Recommend readdir more strongly. * manual/conf.texi (Limits for Files): Add portability note to NAME_MAX, PATH_MAX. (Pathconf): Add portability note for _PC_NAME_MAX, _PC_PATH_MAX. (cherry picked from commit 91ce40854d0b7f865cf5024ef95a8026b76096f3) Conflicts: NEWS
* Fix typo in ChangeLogAndreas Schwab2013-08-061-1/+1
|
* Update Korean translations.David S. Miller2013-08-031-0/+4
| | | | * po/ko.po: Update Korean translation from translation project.
* Update manual/contrib.texiDavid S. Miller2013-08-011-0/+6
| | | | | | * manual/contrib.texi: Update entry for Siddhesh Poyarekar. Add entries for Will Newton, Andi Kleen, David Holsgrove, and Ondrej Bilka.
* Update French translations.David S. Miller2013-07-301-0/+4
| | | | * po/fr.po: Update French translation from translation project.
* Update Czech translations.David S. Miller2013-07-281-0/+2
| | | | * po/cs.po: Update Czech translation from translation project.
* Update Swedish translations.David S. Miller2013-07-281-0/+4
| | | | * po/sv.po: Update Swedish translation from translation project.
* Update Esperanto translations.David S. Miller2013-07-271-0/+2
| | | | * po/eo.po: Update Esperanto translation from translation project.
* Update Vietnamese translations.David S. Miller2013-07-271-0/+2
| | | | * po/vi.po: Update Vietnamese translation from translation project.
* Update German translations.David S. Miller2013-07-271-0/+4
| | | | * po/de.po: Update German translation from translation project.
* Update Bulgarian translations.David S. Miller2013-07-261-0/+2
| | | | * po/bg.po: Update Bulgarian translation from translation project.
* Update Dutch, Polish, and Russian translations.David S. Miller2013-07-261-0/+6
| | | | | | * po/nl.po: Update Dutch translation from translation project. * po/pl.po: Update Polish translation from translation project. * po/ru.po: Update Russian translation from translation project.
* Update libc.pot in preparation for giving tarball to translation project.David S. Miller2013-07-251-0/+4
| | | | * po/libc.pot: Update.
* PowerPC: use _dl_static_init to set GLRO(gl_pagesize)Adhemerval Zanella2013-07-231-0/+8
| | | | | | This patch fixes dlfcn/tststatic5 for PowerPC where pagesize variable was not properly initialized in certain cases. This patch is based on other architecture code.
* S/390: ULPs update.Andreas Krebbel2013-07-221-0/+4
|
* CVE-2013-2207, BZ #15755: Disable pt_chown.Carlos O'Donell2013-07-211-0/+21
| | | | | | | | | | | | | | | | | | | | | | | The helper binary pt_chown tricked into granting access to another user's pseudo-terminal. Pre-conditions for the attack: * Attacker with local user account * Kernel with FUSE support * "user_allow_other" in /etc/fuse.conf * Victim with allocated slave in /dev/pts Using the setuid installed pt_chown and a weak check on whether a file descriptor is a tty, an attacker could fake a pty check using FUSE and trick pt_chown to grant ownership of a pty descriptor that the current user does not own. It cannot access /dev/pts/ptmx however. In most modern distributions pt_chown is not needed because devpts is enabled by default. The fix for this CVE is to disable building and using pt_chown by default. We still provide a configure option to enable hte use of pt_chown but distributions do so at their own risk.
* Update Sparc ULPs.David S. Miller2013-07-201-0/+5
| | | | | * sysdeps/sparc/fpu/libm-test-ulps: Update ULPs to handle minor difference between 32-bit and 64-bit.
* BZ #15711: Avoid circular dependency for syscall.hCarlos O'Donell2013-07-161-0/+7
| | | | | | | | | | | | | | | | | | The generated header is compiled with `-ffreestanding' to avoid any circular dependencies against the installed implementation headers. Such a dependency would require the implementation header to be installed before the generated header could be built (See bug 15711). In current practice the generated header dependencies do not include any of the implementation headers removed by the use of `-ffreestanding'. --- 2013-07-15 Carlos O'Donell <carlos@redhat.com> [BZ #15711] * sysdeps/unix/sysv/linux/Makefile ($(objpfx)bits/syscall%h): Avoid system header dependency with -ffreestanding. ($(objpfx)bits/syscall%d): Likewise.
* Annotate more cases of math bug 15319.David S. Miller2013-07-131-0/+6
| | | | | | * math/libm-test.inc (casin_test_data): Annotate more cases of missing underflows from atanl/atan2l due to bug 15319. (casinh_test_data): Likewise.
* Full from-scratch rebuild of sparc ULPs.David S. Miller2013-07-071-0/+4
| | | | * sysdeps/sparc/fpu/libm-test-ulps: Regenerate from scratch.
* Update x86 and x86_64 ulps on AMD FX-8350 with GCC 4.8.1.Jeroen Albers2013-07-051-0/+5
|
* Fix lock elision help text in INSTALL and configureSiddhesh Poyarekar2013-07-041-0/+6
|
* Update powerpc-fpu ULPs.Adhemerval Zanella2013-07-041-0/+4
|
* Sync sys/ptrace with Linux 3.10Andreas Jaeger2013-07-041-0/+11
|
* Update i386 ULPs.Allan McRae2013-07-031-0/+4
| | | | * sysdeps/i386/fpu/libm-test-ulps: Update.
* Update sparc ULPs.David S. Miller2013-07-021-0/+4
| | | | * sysdeps/sparc/fpu/libm-test-ulps: Update.
* Update x86_64 ULPs.Markus Trippelsdorf2013-07-021-0/+4
|
* Regenerate x86 and x86_64 ulps.Joseph Myers2013-07-021-0/+5
|
* Add a configure option to enable lock elision and disable by defaultAndi Kleen2013-07-021-0/+8
| | | | Can be enabled with --enable-lock-elision=yes at configure time.
* Enable static 32-bit SSE4.2 strcasecmp/strncasecmpH.J. Lu2013-07-021-0/+6
|
* Implement fma in soft-fp.Joseph Myers2013-07-021-0/+51
|
* Skip SSE4.2 versions on Intel SilvermontLiubov Dmitrieva2013-06-281-0/+14
| | | | SSE2/SSSE3 versions are faster than SSE4.2 versions on Intel Silvermont.
* PowerPC: Define AT_HWCAP2 bits and AT_HWCAP2 handling for POWER8.Ryan S. Arnold2013-06-281-0/+18
|
* Add GLRO(dl_hwcap2) for new AT_HWCAP2 auxv_t a_type.Ryan S. Arnold2013-06-281-0/+25
|
* Consistently use page_shift in sysdeps/unix/sysv/linux/mmap64.c.Joseph Myers2013-06-281-0/+5
|
* Test for mprotect failure in dl-load.c (bug 12492).Pierre Ynard2013-06-281-0/+6
|
* Mark packed structure element used with atomic operation aligned.Nathan Froyd2013-06-281-0/+6
|
* Add a dlopen/getpagesize static executable test.Maciej W. Rozycki2013-06-281-0/+8
|
* [BZ #15022] Correct global-scope dlopen issues in static executables.Maciej W. Rozycki2013-06-281-0/+23
| | | | | | | | This change creates a link map in static executables to serve as the global search list for dlopen. It fixes a problem with the inability to access the global symbol object and a crash on an attempt to map a DSO into the global scope. Some code that has become dead after the addition of this link map is removed too and test cases are provided.
* Require GCC 4.4 or later to build glibc.Joseph Myers2013-06-261-0/+8
|