glibc:archlinux/2.18/master

Last commit made on 2013-10-25
Get this branch:
git clone -b archlinux/2.18/master https://git.launchpad.net/glibc

Branch merges

Branch information

Name:
archlinux/2.18/master
Repository:
lp:glibc

Recent commits

0b0e50c... by Siddhesh Poyarekar <email address hidden>

Fix stack overflow due to large AF_INET6 requests

Resolves #16072 (CVE-2013-4458).

This patch fixes another stack overflow in getaddrinfo when it is
called with AF_INET6. The AF_UNSPEC case was fixed as CVE-2013-1914,
but the AF_INET6 case went undetected back then.

(cherry picked from commit 7cbcdb3699584db8913ca90f705d6337633ee10f)

Conflicts:
 NEWS

5437792... by Allan McRae

Fix incorrect getaddrinfo assertion trigger

[BZ #9954]

With the following /etc/hosts:
127.0.0.1 www.my-domain.es
127.0.1.1 www.my-domain.es
192.168.0.1 www.my-domain.es

Using getaddrinfo() on www.my-domain.es, trigger the following assertion:
../sysdeps/posix/getaddrinfo.c:1473: rfc3484_sort: Assertion
`src->results[i].native == -1 || src->results[i].native == a1_native' failed.

This is due to two different bugs:
- In rfc3484_sort() rule 7, src->results[i].native is assigned even if
src->results[i].index is -1, meaning that no interface is associated.
- In getaddrinfo() the source IP address used with the lo interface needs a
special case, as it can be any IP within 127.X.Y.Z.

(cherry picked from commit 894f3f1049135dcbeaab8f18690973663ef3147c)

9a010a5... by Carlos-0

BZ #15754: Fix test case for ARM.

Statically built binaries use __pointer_chk_guard_local,
while dynamically built binaries use __pointer_chk_guard.
Provide the right definition depending on the test case
we are building.

f03cfdf... by Carlos-0

BZ #15754: CVE-2013-4788

The pointer guard used for pointer mangling was not initialized for
static applications resulting in the security feature being disabled.
The pointer guard is now correctly initialized to a random value for
static applications. Existing static applications need to be
recompiled to take advantage of the fix.

The test tst-ptrguard1-static and tst-ptrguard1 add regression
coverage to ensure the pointer guards are sufficiently random
and initialized to a default value.

Conflicts:
 NEWS
 ports/ChangeLog.ia64
 ports/ChangeLog.tile

6957bcb... by Siddhesh Poyarekar <email address hidden>

Check for integer overflow in cache size computation in strcoll

strcoll is implemented using a cache for indices and weights of
collation sequences in the strings so that subsequent passes do not
have to search through collation data again. For very large string
inputs, the cache size computation could overflow. In such a case,
use the fallback function that does not cache indices and weights of
collation sequences.

Fixes CVE-2012-4412.

(cherry picked from commit 303e567a8062200dc06acde7c76fc34679f08d8f)

Conflicts:
 NEWS

5653266... by Siddhesh Poyarekar <email address hidden>

Fall back to non-cached sequence traversal and comparison on malloc fail

strcoll currently falls back to alloca if malloc fails, resulting in a
possible stack overflow. This patch implements sequence traversal and
comparison without caching indices and rules.

Fixes CVE-2012-4424.

(cherry picked from commit 141f3a77fe4f1b59b0afa9bf6909cd2000448883)

Conflicts:
 NEWS

52b8d67... by Siddhesh Poyarekar <email address hidden>

Simplify strcoll implementation

Break up strcoll into simpler functions so that the logic is easier to
follow and maintain.

(cherry picked from commit 1326ba1af22068db9488c2328bdaf852b8a93dcf)

dc7ba18... by Will Newton

malloc: Check for integer overflow in memalign.

A large bytes parameter to memalign could cause an integer overflow
and corrupt allocator internals. Check the overflow does not occur
before continuing with the allocation.

ChangeLog:

2013-09-11 Will Newton <email address hidden>

 [BZ #15857]
 * malloc/malloc.c (__libc_memalign): Check the value of bytes
 does not overflow.

(cherry picked from commit b73ed247781d533628b681f57257dc85882645d3)

8f29d3b... by Will Newton

malloc: Check for integer overflow in valloc.

A large bytes parameter to valloc could cause an integer overflow
and corrupt allocator internals. Check the overflow does not occur
before continuing with the allocation.

ChangeLog:

2013-09-11 Will Newton <email address hidden>

 [BZ #15856]
 * malloc/malloc.c (__libc_valloc): Check the value of bytes
 does not overflow.

(cherry picked from commit 55e17aadc1ef17a1df9626fb0e9fba290ece3331)

63e9a36... by Will Newton

malloc: Check for integer overflow in pvalloc.

A large bytes parameter to pvalloc could cause an integer overflow
and corrupt allocator internals. Check the overflow does not occur
before continuing with the allocation.

ChangeLog:

2013-09-11 Will Newton <email address hidden>

 [BZ #15855]
 * malloc/malloc.c (__libc_pvalloc): Check the value of bytes
 does not overflow.

(cherry picked from commit 1159a193696ad48ec86e5895f6dee3e539619c0e)