[arch-commits] Commit in glibc/trunk (glibc-2.21-roundup.patch)

Jan Steffens heftig at archlinux.org
Fri Aug 7 12:54:10 UTC 2015


    Date: Friday, August 7, 2015 @ 14:54:10
  Author: heftig
Revision: 243110

Remove old patch

Deleted:
  glibc/trunk/glibc-2.21-roundup.patch

--------------------------+
 glibc-2.21-roundup.patch |   97 ---------------------------------------------
 1 file changed, 97 deletions(-)

Deleted: glibc-2.21-roundup.patch
===================================================================
--- glibc-2.21-roundup.patch	2015-08-07 12:39:10 UTC (rev 243109)
+++ glibc-2.21-roundup.patch	2015-08-07 12:54:10 UTC (rev 243110)
@@ -1,97 +0,0 @@
-diff --git a/ChangeLog b/ChangeLog
-index dc1ed1b..26feb07 100644
---- a/ChangeLog
-+++ b/ChangeLog
-@@ -1,3 +1,15 @@
-+2015-04-21  Arjun Shankar  <arjun.is at lostca.se>
-+
-+	[BZ #18287]
-+	* resolv/nss_dns/dns-host.c (getanswer_r): Adjust buffer length
-+	based on padding.  (CVE-2015-1781)
-+
-+2015-02-10  Evangelos Foutras  <evangelos at foutrelis.com>
-+
-+	[BZ #17949]
-+	* sysdeps/i386/i686/multiarch/mempcpy_chk.S: Fix position of
-+	jump label.
-+
- 2015-02-06  Carlos O'Donell  <carlos at systemhalted.org>
- 
- 	* version.h (RELEASE): Set to "stable".
-@@ -7,6 +19,7 @@
- 	* sysdeps/unix/sysv/linux/hppa/pthread.h: Sync with pthread.h.
- 
- 2015-02-05  Paul Pluzhnikov  <ppluzhnikov at google.com>
-+	    Paul Eggert  <eggert at cs.ucla.edu>
- 
- 	[BZ #16618]
- 	* stdio-common/tst-sscanf.c (main): Test for buffer overflow.
-diff --git a/NEWS b/NEWS
-index 617cdbb..c9f6b58 100644
---- a/NEWS
-+++ b/NEWS
-@@ -5,6 +5,19 @@ See the end for copying conditions.
- Please send GNU C library bug reports via <http://sourceware.org/bugzilla/>
- using `glibc' in the "product" field.
- 

-+Version 2.21.1
-+
-+* The following bugs are resolved with this release:
-+
-+  17949, 18287.
-+
-+* A buffer overflow in gethostbyname_r and related functions performing DNS
-+  requests has been fixed.  If the NSS functions were called with a
-+  misaligned buffer, the buffer length change due to pointer alignment was
-+  not taken into account.  This could result in application crashes or,
-+  potentially arbitrary code execution, using crafted, but syntactically
-+  valid DNS responses.  (CVE-2015-1781)
-+

- Version 2.21
- 
- * The following bugs are resolved with this release:
-@@ -21,10 +34,11 @@ Version 2.21
-   17801, 17803, 17806, 17834, 17844, 17848, 17868, 17869, 17870, 17885,
-   17892.
- 
--* CVE-2015-1472 Under certain conditions wscanf can allocate too little
--  memory for the to-be-scanned arguments and overflow the allocated
--  buffer.  The implementation now correctly computes the required buffer
--  size when using malloc.
-+* CVE-2015-1472 CVE-2015-1473 Under certain conditions wscanf can allocate
-+  too little memory for the to-be-scanned arguments and overflow the
-+  allocated buffer.  The implementation now correctly computes the required
-+  buffer size when using malloc, and switches to malloc from alloca as
-+  intended.
- 
- * A new semaphore algorithm has been implemented in generic C code for all
-   machines. Previous custom assembly implementations of semaphore were
-diff --git a/resolv/nss_dns/dns-host.c b/resolv/nss_dns/dns-host.c
-index f715ab0..40069a7 100644
---- a/resolv/nss_dns/dns-host.c
-+++ b/resolv/nss_dns/dns-host.c
-@@ -615,7 +615,8 @@ getanswer_r (const querybuf *answer, int anslen, const char *qname, int qtype,
-   int have_to_map = 0;
-   uintptr_t pad = -(uintptr_t) buffer % __alignof__ (struct host_data);
-   buffer += pad;
--  if (__glibc_unlikely (buflen < sizeof (struct host_data) + pad))
-+  buflen = buflen > pad ? buflen - pad : 0;
-+  if (__glibc_unlikely (buflen < sizeof (struct host_data)))
-     {
-       /* The buffer is too small.  */
-     too_small:
-diff --git a/sysdeps/i386/i686/multiarch/mempcpy_chk.S b/sysdeps/i386/i686/multiarch/mempcpy_chk.S
-index 207b648..b6fa202 100644
---- a/sysdeps/i386/i686/multiarch/mempcpy_chk.S
-+++ b/sysdeps/i386/i686/multiarch/mempcpy_chk.S
-@@ -36,8 +36,8 @@ ENTRY(__mempcpy_chk)
- 	cmpl	$0, KIND_OFFSET+__cpu_features at GOTOFF(%ebx)
- 	jne	1f
- 	call	__init_cpu_features
--	leal	__mempcpy_chk_ia32 at GOTOFF(%ebx), %eax
--1:	testl	$bit_SSE2, CPUID_OFFSET+index_SSE2+__cpu_features at GOTOFF(%ebx)
-+1:	leal	__mempcpy_chk_ia32 at GOTOFF(%ebx), %eax
-+	testl	$bit_SSE2, CPUID_OFFSET+index_SSE2+__cpu_features at GOTOFF(%ebx)
- 	jz	2f
- 	leal	__mempcpy_chk_sse2_unaligned at GOTOFF(%ebx), %eax
- 	testl	$bit_Fast_Unaligned_Load, FEATURE_OFFSET+index_Fast_Unaligned_Load+__cpu_features at GOTOFF(%ebx)



More information about the arch-commits mailing list