This is the mail archive of the
libc-alpha@sourceware.org
mailing list for the glibc project.
Re: [PATCH] BZ #15754: CVE-2013-4788: PTR_MANGLE does not initialize to a random value for the pointer guard when compiling static executables
- From: "Joseph S. Myers" <joseph at codesourcery dot com>
- To: Carlos O'Donell <carlos at redhat dot com>
- Cc: GNU C Library <libc-alpha at sourceware dot org>, Ismael Ripoll <iripoll at disca dot upv dot es>, Hector Marco <hecmargi at upv dot es>, Siddhesh Poyarekar <siddhesh at redhat dot com>, Andreas Jaeger <aj at suse dot com>
- Date: Fri, 19 Jul 2013 16:52:47 +0000
- Subject: Re: [PATCH] BZ #15754: CVE-2013-4788: PTR_MANGLE does not initialize to a random value for the pointer guard when compiling static executables
- References: <51E8EDF2 dot 40204 at redhat dot com>
On Fri, 19 Jul 2013, Carlos O'Donell wrote:
> This test only passes on x86-64, all other targets need to
> implement POINTER_CHK_GUARD in stackguard-macros.h to pass
> the test (and even build at this point). We might want to
> rename stackguard-macros.h, but I didn't.
You should definitely update sysdeps/generic/stackguard-macros.h to
(declare the variable and) define POINTER_CHK_GUARD for the
non-THREAD_SET_POINTER_GUARD case.
--
Joseph S. Myers
joseph@codesourcery.com