BZ #15754: CVE-2013-4788
authorCarlos O'Donell <carlos@redhat.com>
Mon, 23 Sep 2013 04:52:09 +0000 (00:52 -0400)
committerCarlos O'Donell <carlos@redhat.com>
Mon, 23 Sep 2013 04:52:09 +0000 (00:52 -0400)
commitc61b4d41c9647a54a329aa021341c0eb032b793e
treec4a665c232a7d37786a6f3b5e3f56d0ae11480e8
parent58a96064d193317236b740998e134b652d3d62ad
BZ #15754: CVE-2013-4788

The pointer guard used for pointer mangling was not initialized for
static applications resulting in the security feature being disabled.
The pointer guard is now correctly initialized to a random value for
static applications. Existing static applications need to be
recompiled to take advantage of the fix.

The test tst-ptrguard1-static and tst-ptrguard1 add regression
coverage to ensure the pointer guards are sufficiently random
and initialized to a default value.
19 files changed:
ChangeLog
NEWS
csu/libc-start.c
elf/Makefile
elf/tst-ptrguard1-static.c [new file with mode: 0644]
elf/tst-ptrguard1.c [new file with mode: 0644]
ports/ChangeLog.ia64
ports/ChangeLog.tile
ports/sysdeps/ia64/stackguard-macros.h
ports/sysdeps/tile/stackguard-macros.h
sysdeps/generic/stackguard-macros.h
sysdeps/i386/stackguard-macros.h
sysdeps/powerpc/powerpc32/stackguard-macros.h
sysdeps/powerpc/powerpc64/stackguard-macros.h
sysdeps/s390/s390-32/stackguard-macros.h
sysdeps/s390/s390-64/stackguard-macros.h
sysdeps/sparc/sparc32/stackguard-macros.h
sysdeps/sparc/sparc64/stackguard-macros.h
sysdeps/x86_64/stackguard-macros.h