about summary refs log tree commit diff
path: root/ChangeLog
Commit message (Collapse)AuthorAgeFilesLines
* _nl_find_locale: Improve handling of crafted locale names [BZ #17137]Florian Weimer2014-09-051-0/+9
| | | | | | | | | | | | | | Prevent directory traversal in locale-related environment variables (CVE-2014-0475). (cherry picked from commit 4e8f95a0df7c2300b830ec12c0ae1e161bc8a8a3) Addiational backporting fixes: Added tst-setlocale3-ENV to localedata/Makefile Conflicts: NEWS localedata/Makefile
* setlocale: Use the heap for the copy of the locale argumentFlorian Weimer2014-09-051-0/+5
| | | | | | This avoids alloca calls with potentially large arguments. (cherry picked from commit d183645616b0533b3acee28f1a95570bffbdf50f)
* Use NSS_STATUS_TRYAGAIN to indicate insufficient buffer (BZ #16878)Siddhesh Poyarekar2014-09-051-0/+8
| | | | | | | | | | | | | | | | | The netgroups nss modules in the glibc tree use NSS_STATUS_UNAVAIL (with errno as ERANGE) when the supplied buffer does not have sufficient space for the result. This is wrong, because the canonical way to indicate insufficient buffer is to set the errno to ERANGE and the status to NSS_STATUS_TRYAGAIN, as is used by all other modules. This fixes nscd behaviour when the nss_ldap module returns NSS_STATUS_TRYAGAIN to indicate that a netgroup entry is too long to fit into the supplied buffer. (cherry picked from commit c3ec475c5dd16499aa040908e11d382c3ded9692) Conflicts: NEWS
* Provide correct buffer length to netgroup queries in nscd (BZ #16695)Siddhesh Poyarekar2014-09-051-0/+6
| | | | | | | | | | | | | | The buffer to query netgroup entries is allocated sufficient space for the netgroup entries and the key to be appended at the end, but it sends in an incorrect available length to the NSS netgroup query functions, resulting in overflow of the buffer in some special cases. The fix here is to factor in the key length when sending the available buffer and buffer length to the query functions. (cherry picked from commit c44496df2f090a56d3bf75df930592dac6bba46f) Conflicts: NEWS
* [BZ #16046] dl_iterate_phdr static executable testMaciej W. Rozycki2014-09-051-0/+6
| | | | (cherry picked from commit 257ce7127e2f64a6a959b146786cd43de0e42b5f)
* Fix another memory leak in regexp compiler (BZ #17069)Andreas Schwab2014-09-051-0/+7
| | | | | | | (cherry picked from commit aa6ec754f3b4b1df81d186480c534b6486a1e6ee) Conflicts: NEWS
* Fix memory leak in regexp compiler (BZ #17069)Andreas Schwab2014-09-051-0/+12
| | | | | | | (cherry picked from commit 4d43ef1e7434d7d419afbcd754931cb0c794763c) Conflicts: posix/Makefile
* Fix invalid file descriptor reuse while sending DNS query (BZ #15946)Andreas Schwab2014-09-051-0/+6
| | | | | | | (cherry picked from commit f9d2d03254a58d92635a311a42253eeed5a40a47) Conflicts: NEWS
* Properly fix memory leak in _nss_dns_gethostbyname4_r with big DNS answerAndreas Schwab2014-09-051-0/+37
| | | | | | | Instead of trying to guess whether the second buffer needs to be freed set a flag at the place it is allocated (cherry picked from commit ab09bf616ad527b249aca5f2a4956fd526f0712f)
* Fix memory leak in _nss_dns_gethostbyname4_r with big DNS answerAndreas Schwab2014-09-051-0/+6
| | | | | | | (cherry picked from commit d668061994a7486a3ba9c7d5e7882d85a2883707) Conflicts: NEWS
* Fix unbound stack use in NIS NSS moduleAndreas Schwab2014-09-051-0/+11
| | | | | | | (cherry picked from commit 315eb1d86aea489cd6325fd1c2521dcfb4fc0e1c) Conflicts: NEWS
* Mention CVE-2014-4043 in NEWSAllan McRae2014-09-051-0/+4
| | | | | | | (cherry picked from commit d03efb2f979defd473955a455d66b949961d26b2) Conflicts: NEWS
* posix_spawn_faction_addopen: Add missing string.h include directiveStefan Liebler2014-09-051-0/+4
| | | | | | This is needed to avoid a PLT call on s390. (cherry picked from commit 35a5e3e338ae17f3d42c60a708763c5d498fb840)
* posix_spawn_file_actions_addopen needs to copy the path argument (BZ 17048)Florian Weimer2014-06-221-0/+13
| | | | | | | | | | | | | POSIX requires that we make a copy, so we allocate a new string and free it in posix_spawn_file_actions_destroy. Reported by David Reid, Alex Gaynor, and Glyph Lefkowitz. This bug may have security implications. (cherry picked from commit 89e435f3559c53084498e9baad22172b64429362) Conflicts: NEWS
* Fixed pthread_spin_lock on sparc32/64 (bug 16882)Guo Yixuan2014-06-031-0/+11
| | | | | | | | | | | [BZ #16882] * nptl/sysdeps/sparc/sparc32/pthread_spin_lock.S (pthread_spin_lock): Branch out of spin loop to proper location. * nptl/sysdeps/sparc/sparc64/pthread_spin_lock.S (pthread_spin_lock): Likewise. * nptl/tst-spin4.c: New test. * nptl/Makefile (tests): Add tst-spin4.
* Fix sparc memcpy data corruption when using niagara2 optimized routines.Jose E. Marchesi2014-05-171-0/+6
| | | | | * sysdeps/sparc/sparc64/multiarch/memcpy-niagara2.S: Add missing membar to avoid block loads/stores to overlap previous stores.
* tzselect: use zonedir instead of current working directorySami Kerola2014-05-161-0/+5
| | | | | | | | (cherry picked from commit 893b4f375668c025cbd6828f82a8844edda276d1) (cherry picked from commit c72399fbc5228580a560d8fe319ff98150928b05) Conflicts: timezone/Makefile
* Update Swedish translationsAllan McRae2014-05-161-0/+4
| | | | (cherry picked from commit d51d659d114e2edb0037b2af45d6ee36458e48d1)
* SPARC: add prlimit and prlimit64 in <bits/resource.h> (BZ #16943)Aurelien Jarno2014-05-161-0/+6
| | | | | | | | | | prlimit and prlimit64 have been added in the main <bits/resource.h>, but not in the SPARC specific version. Fix that. Note: this is Debian bug#703559, reported by Emilio Pozuelo Monfort <pochu@debian.org> (cherry picked from commit d16e6ec7ca2c861ba681e3a2fbd431725774292e)
* SPARC: add EFD_SEMAPHORE in <bits/eventfd.h> (BZ #16916)Aurelien Jarno2014-05-071-0/+6
| | | | | | | EFD_SEMAPHORE has been added in the main <bits/eventfd.h>, but not in the SPARC specific version. Fix that. (cherry picked from commit 83df9ad0cc861ef24f08a88c5a4c055e2516d33c)
* Update Esperanto translationsAllan McRae2014-05-041-0/+4
| | | | (cherry picked from commit d69aeb123961252ddd2a23acc7dc9ce0ae2cfa5f)
* Fix v9/64-bit strcmp when string ends in multiple zero bytes.David S. Miller2014-05-011-0/+10
| | | | | | | | | | [BZ #16885] * sysdeps/sparc/sparc64/strcmp.S: Fix end comparison handling when multiple zero bytes exist at the end of a string. Reported by Aurelien Jarno <aurelien@aurel32.net> * string/test-strcmp.c (check): Add explicit test for situations where there are multiple zero bytes after the first.
* Fix sign of input to bsloww1 (BZ #16623)Siddhesh Poyarekar2014-02-271-0/+7
| | | | | | | | In 84ba214c, I removed some redundant sign computations and in the process, I incorrectly got rid of a temporary variable, thus passing the absolute value of the input to bsloww1. This caused #16623. This fix undoes the incorrect change.
* Update x86_64 libm-test-ulps on AMD family 21h model 1 (bug 16545).Dylan Alex Simon2014-02-201-0/+6
| | | | | | | (cherry picked from commit fbfdf9cb039486f66994637081862c01bbd6a765) Conflicts: NEWS
* Bug 15968 was fixed by commit 0748546f660d27a2ad29fa6174d456e2f6490758.Joseph Myers2014-02-071-0/+1
|
* Bug 6981 was fixed by commit 1484e65736f4cab27e5051e0f06be8470e69af82.Joseph Myers2014-02-071-0/+1
|
* BZ #16529: Fix pedantic warning with netinet/in.h.Carlos O'Donell2014-02-061-0/+5
| | | | | | | | | | | | | | | | | When compiling with pedantic the following warning is seen: gcc -Wall -pedantic -O0 -o test test.c In file included from test.c:3:0: /path/inet/netinet/in.h:111:21: warning: comma at end of \ enumerator list [-Wpedantic] IPPROTO_MH = 135, /* IPv6 mobility header. */ ^ It is valid C99 to have a trailing comma after the last item in an enumeration. However it is not valid C90. If possible glibc attempts to keep all headers C90 + long long without requiring C99 features. In this case it's easy to fix the headers and it removes the warning seem with -pedantic.
* Update contrib.texiSiddhesh Poyarekar2014-02-061-0/+5
| | | | Update blurb for Roland, Alex, Ryan, Joseph and Carlos.
* Add missing ChangeLog from yesterday's sparc ULPs update.David S. Miller2014-02-051-0/+5
|
* Revert "Patch [1/4] async-signal safe TLS."Allan McRae2014-02-061-11/+0
| | | | This reverts commit 69a17d9d245dc3551792e95e1823cc2d877592f3.
* Revert "Patch 3/4 of the effort to make TLS access async-signal-safe."Allan McRae2014-02-061-7/+0
| | | | This reverts commit 35e8f7ab94c910659de9d507aa0f3e1f8973d914.
* Revert "Patch 2/4 of the effort to make TLS access async-signal-safe."Allan McRae2014-02-061-19/+0
| | | | | | | | | | | | | This reverts commit 1f33d36a8a9e78c81bed59b47f260723f56bb7e6. Conflicts: elf/dl-misc.c Also reverts the follow commits that were bug fixes to new code introduced in the above commit: 063b2acbce83549df82ab30f5af573f1b9c4bd19 b627fdd58554bc36bd344dc40a8787c4b7a9cc46 e81c64bba13d2d8b2a4e53254a82cc80f27c8497
* Revert "Async-signal safe TLS."Allan McRae2014-02-061-9/+0
| | | | | | | | | This reverts commit 7f507ee17aee720fa423fa38502bc3caa0dd03d7. Conflicts: ChangeLog nptl/tst-tls7.c nptl/tst-tls7mod.c
* Fix comment in kernel-features.h.Carlos O'Donell2014-02-051-0/+2
| | | | Use "was" not "were."
* Fix tst-setgetname for Linux kernels < 2.6.33.Carlos O'Donell2014-02-051-0/+6
| | | | | | | | Support for /proc/self/task/$tid/comm as added in Linux 2.6.33, therefore since the test tst-setgetname relies on this functionality to operate we must skip the test in kernels < 2.6.33. We wrap the checks with __ASSUME_PROC_PID_TASK_COMM such that in the future when we move arch_minimum_kernel to 2.6.33 we can remove this code.
* Update contrib.texiSiddhesh Poyarekar2014-02-051-0/+6
| | | | | | This may not be a complete list of new contributors added to the list, so I'd love it if more people look at contributions and suggest additions.
* PowerPC: powerpc64le abilist for 2.17Adhemerval Zanella2014-02-041-0/+29
| | | | This patch is the abifiles for powerpc64le based on GLIBC 2.17.
* PowerPC: Change powerpc64le start ABI to 2.17.Adhemerval Zanella2014-02-041-0/+5
|
* abilist-pattern configurabilityAdhemerval Zanella2014-02-041-0/+11
| | | | | | | This patch creates implicit rules to match the abifiles if abilist-pattern is defined in the architecture Makefile. This allows machine specific Makefiles to define different abifiles names (for instance *-le.abilist for powerpc64le).
* Update x86_64 ULPs (AMD family 21, model 2)Eric Wong2014-02-041-0/+4
| | | | Tested on an AMD FX-8320 CPU
* Update x86_64 ULPs (AMD Family 10h)Eric Wong2014-02-041-0/+4
|
* Remove excessive redundant ChangeLog header lines.Roland McGrath2014-02-031-74/+0
|
* Fix manual build warnings.Carlos O'Donell2014-02-031-0/+5
| | | | | | | The mixed use of automatic and manual node next, previous, and top specification causes warning when building the manual. This fix explicitly specifies the node's next, previous and top values to fix the warning.
* * manual/macros.texi: Add comments before MTASC-safety macros.Alexandre Oliva2014-02-031-0/+4
|
* * manual/users.texi: Document MTASC-safety properties.Alexandre Oliva2014-02-031-0/+4
|
* * manual/threads.texi (pthread_key_create, pthread_key_delete,Alexandre Oliva2014-02-031-0/+8
| | | | | | | pthread_getspecific, pthread_setspecific): Format with @deftypefun, and add @safety note. * manual/signal.texi: Move comments that analyze the above functions to their home place.
* Update Slovenian translationsAllan McRae2014-02-031-0/+4
|
* * manual/time.texi (timegm): Add missing blank after @c.Alexandre Oliva2014-02-021-0/+5
| | | | Reported by Joseph Myers <joseph@codesourcery.com>.
* * manual/check-safety.sh: New.Alexandre Oliva2014-02-011-0/+5
| | | | * manual/Makefile ($(objpfx)stamp-summary): Run it.
* * manual/terminal.texi: Document MTASC-safety properties.Alexandre Oliva2014-02-011-0/+4
|