glibc:gentoo/2.18

Last commit made on 2014-01-25
Get this branch:
git clone -b gentoo/2.18 https://git.launchpad.net/glibc

Branch merges

Branch information

Name:
gentoo/2.18
Repository:
lp:glibc

Recent commits

787172f... by Richard Henderson

alpha: Fix tls-macros.h

Reported to the gcc bugzilla, there was a missing dependency on $gp
that let the compiler generated $gp reload be scheduled across the
macros here.

(cherry picked from commit 4ab6acaebd0047dc37c6493946484be9f1b4920b)

f09e8ae... by Will Newton

ARM: Fix clone build for ARMv4

ARMv4 does not have the blx instruction, so use the BLX macro which
handles abstracting this for us.

Build tested for armv7, armv4t and armv4.

ports/ChangeLog.arm:

2014-01-24 Will Newton <email address hidden>

 [BZ #16499]
 * sysdeps/unix/sysv/linux/arm/clone.S: Use BLX macro instead
 of blx instruction directly.

(cherry picked from commit 47590bce28616abbcee93457da91d65a7a07589b)

3cd70f9... by DaveM

Fix sparc 64-bit GMP ifunc resolution in static builds.

 [BZ #16150]
 * sysdeps/sparc/sparc64/multiarch/add_n.S: Resolve to the correct generic
 symbol in the non-vis3 case in static builds.
 * sysdeps/sparc/sparc64/multiarch/addmul_1.S: Likewise.
 * sysdeps/sparc/sparc64/multiarch/mul_1.S: Likewise.
 * sysdeps/sparc/sparc64/multiarch/sub_n.S: Likewise.
 * sysdeps/sparc/sparc64/multiarch/submul_1.S: Likewise.

(cherry picked from commit 2293d2b10a583486cd22ce578796848f4c3a8b6d)

e02bebc... by DaveM

Fix build on pre-v9 32-bit Sparc.

We cannot use fnegd in this code, as fnegd was added in v9.
Only fnegs exists in v8 and earlier.

 [BZ #15985]
 * sysdeps/sparc/sparc32/fpu/s_fdim.S (__fdim): Do not use fnegd
 on pre-v9 cpus, use a fnegs+fmovs sequence instead.

(cherry picked from commit 2216e48645dbd297cdc0f4050fdfc0b52e2a4ab8)

9695c98... by Adhemerval Zanella <email address hidden>

PowerPC: Fix POINTER_CHK_GUARD thread register for PPC64

(cherry picked from commit dc3a1f98dc4c86cb454474f4912ae325573655cb)

4da92b3... by Will Newton

malloc: Check for integer overflow in memalign.

A large bytes parameter to memalign could cause an integer overflow
and corrupt allocator internals. Check the overflow does not occur
before continuing with the allocation.

ChangeLog:

2013-09-11 Will Newton <email address hidden>

 [BZ #15857]
 * malloc/malloc.c (__libc_memalign): Check the value of bytes
 does not overflow.

(cherry picked from commit c51d675c459aefef8d84d5a0b114010f916ea278)

42b872e... by Will Newton

malloc: Check for integer overflow in valloc.

A large bytes parameter to valloc could cause an integer overflow
and corrupt allocator internals. Check the overflow does not occur
before continuing with the allocation.

ChangeLog:

2013-09-11 Will Newton <email address hidden>

 [BZ #15856]
 * malloc/malloc.c (__libc_valloc): Check the value of bytes
 does not overflow.

(cherry picked from commit 6a6a386a3040726053a5fb8582ff26dc85d84741)

7e52cc7... by Will Newton

malloc: Check for integer overflow in pvalloc.

A large bytes parameter to pvalloc could cause an integer overflow
and corrupt allocator internals. Check the overflow does not occur
before continuing with the allocation.

ChangeLog:

2013-09-11 Will Newton <email address hidden>

 [BZ #15855]
 * malloc/malloc.c (__libc_pvalloc): Check the value of bytes
 does not overflow.

(cherry picked from commit 7e0e64ead52591b968df582b0ddc247ba5c4eab4)

4e3c791... by Carlos-0

BZ #15754: CVE-2013-4788

The pointer guard used for pointer mangling was not initialized for
static applications resulting in the security feature being disabled.
The pointer guard is now correctly initialized to a random value for
static applications. Existing static applications need to be
recompiled to take advantage of the fix.

The test tst-ptrguard1-static and tst-ptrguard1 add regression
coverage to ensure the pointer guards are sufficiently random
and initialized to a default value.

(cherry picked from commit c779e9df75256f19c7be8d12b2d163e2016a63f4)

46ee924... by Siddhesh Poyarekar <email address hidden>

Fix stack overflow due to large AF_INET6 requests

Resolves #16072 (CVE-2013-4458).

This patch fixes another stack overflow in getaddrinfo when it is
called with AF_INET6. The AF_UNSPEC case was fixed as CVE-2013-1914,
but the AF_INET6 case went undetected back then.

(cherry picked from commit 6f95434fd488e9b72117f9b93ec2e2dbf397a4d3)