This is the mail archive of the
glibc-bugs@sourceware.org
mailing list for the glibc project.
[Bug regex/17069] leak in regcomp
- From: "cvs-commit at gcc dot gnu.org" <sourceware-bugzilla at sourceware dot org>
- To: glibc-bugs at sourceware dot org
- Date: Sun, 22 Jun 2014 07:46:16 +0000
- Subject: [Bug regex/17069] leak in regcomp
- Auto-submitted: auto-generated
- References: <bug-17069-131 at http dot sourceware dot org/bugzilla/>
https://sourceware.org/bugzilla/show_bug.cgi?id=17069
--- Comment #9 from cvs-commit at gcc dot gnu.org <cvs-commit at gcc dot gnu.org> ---
This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "GNU C Library master sources".
The branch, allan/2.19/backport has been created
at 7e09ce56759640a4bf10e4d6ddca77757e115f13 (commit)
- Log -----------------------------------------------------------------
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=7e09ce56759640a4bf10e4d6ddca77757e115f13
commit 7e09ce56759640a4bf10e4d6ddca77757e115f13
Author: Siddhesh Poyarekar <siddhesh@redhat.com>
Date: Mon May 26 11:40:08 2014 +0530
Use NSS_STATUS_TRYAGAIN to indicate insufficient buffer (BZ #16878)
The netgroups nss modules in the glibc tree use NSS_STATUS_UNAVAIL
(with errno as ERANGE) when the supplied buffer does not have
sufficient space for the result. This is wrong, because the canonical
way to indicate insufficient buffer is to set the errno to ERANGE and
the status to NSS_STATUS_TRYAGAIN, as is used by all other modules.
This fixes nscd behaviour when the nss_ldap module returns
NSS_STATUS_TRYAGAIN to indicate that a netgroup entry is too long to
fit into the supplied buffer.
(cherry picked from commit c3ec475c5dd16499aa040908e11d382c3ded9692)
Conflicts:
NEWS
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=6489b92b735504bbb124c0a29967e52906101e56
commit 6489b92b735504bbb124c0a29967e52906101e56
Author: Siddhesh Poyarekar <siddhesh@redhat.com>
Date: Wed Mar 12 17:27:22 2014 +0530
Provide correct buffer length to netgroup queries in nscd (BZ #16695)
The buffer to query netgroup entries is allocated sufficient space for
the netgroup entries and the key to be appended at the end, but it
sends in an incorrect available length to the NSS netgroup query
functions, resulting in overflow of the buffer in some special cases.
The fix here is to factor in the key length when sending the available
buffer and buffer length to the query functions.
(cherry picked from commit c44496df2f090a56d3bf75df930592dac6bba46f)
Conflicts:
NEWS
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=00e1e5950611a1d8d5d6605906d11432ecd6e7c5
commit 00e1e5950611a1d8d5d6605906d11432ecd6e7c5
Author: Maciej W. Rozycki <macro@codesourcery.com>
Date: Fri Jun 20 21:52:53 2014 +0100
[BZ #16046] dl_iterate_phdr static executable test
(cherry picked from commit 257ce7127e2f64a6a959b146786cd43de0e42b5f)
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=0625ebcc25a4eda851b53b50f99fa49f790b9ee8
commit 0625ebcc25a4eda851b53b50f99fa49f790b9ee8
Author: Andreas Schwab <schwab@linux-m68k.org>
Date: Fri Jun 20 12:41:27 2014 +0200
Fix another memory leak in regexp compiler (BZ #17069)
(cherry picked from commit aa6ec754f3b4b1df81d186480c534b6486a1e6ee)
Conflicts:
NEWS
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=fc93c8a02c25e2486f3057ae06cf79209c381832
commit fc93c8a02c25e2486f3057ae06cf79209c381832
Author: Andreas Schwab <schwab@linux-m68k.org>
Date: Thu Jun 19 15:38:03 2014 +0200
Fix memory leak in regexp compiler (BZ #17069)
(cherry picked from commit 4d43ef1e7434d7d419afbcd754931cb0c794763c)
Conflicts:
posix/Makefile
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=7b17d60f13089585c2b63d46cbc660c4b85d169d
commit 7b17d60f13089585c2b63d46cbc660c4b85d169d
Author: Andreas Schwab <schwab@suse.de>
Date: Mon May 26 18:01:31 2014 +0200
Fix invalid file descriptor reuse while sending DNS query (BZ #15946)
(cherry picked from commit f9d2d03254a58d92635a311a42253eeed5a40a47)
Conflicts:
NEWS
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=76aebfbb87ecc33e59d29a8adda76dfcdbc9213d
commit 76aebfbb87ecc33e59d29a8adda76dfcdbc9213d
Author: Andreas Schwab <schwab@suse.de>
Date: Tue Feb 18 10:57:25 2014 +0100
Properly fix memory leak in _nss_dns_gethostbyname4_r with big DNS answer
Instead of trying to guess whether the second buffer needs to be freed
set a flag at the place it is allocated
(cherry picked from commit ab09bf616ad527b249aca5f2a4956fd526f0712f)
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=c6ce0dadcfd14973ba880f4e043058a9367f00ce
commit c6ce0dadcfd14973ba880f4e043058a9367f00ce
Author: OndÅej BÃlka <neleai@seznam.cz>
Date: Sun Feb 16 12:59:23 2014 +0100
Deduplicate resolv/nss_dns/dns-host.c
In resolv/nss_dns/dns-host.c one of code path duplicated code after
that. We merge these paths.
(cherry picked from commit ab7ac0f2cf8731fe4c3f3aea6088a7c0127b5725)
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4ad0ab7bdb6c4afb3fc561c6497759eb939d2a73
commit 4ad0ab7bdb6c4afb3fc561c6497759eb939d2a73
Author: Andreas Schwab <schwab@suse.de>
Date: Thu Feb 13 11:01:57 2014 +0100
Fix memory leak in _nss_dns_gethostbyname4_r with big DNS answer
(cherry picked from commit d668061994a7486a3ba9c7d5e7882d85a2883707)
Conflicts:
NEWS
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=00a84253c5bc7dffb7a0a666cea21ea5e0288771
commit 00a84253c5bc7dffb7a0a666cea21ea5e0288771
Author: Andreas Schwab <schwab@suse.de>
Date: Thu May 8 16:53:01 2014 +0200
Fix unbound stack use in NIS NSS module
(cherry picked from commit 315eb1d86aea489cd6325fd1c2521dcfb4fc0e1c)
Conflicts:
NEWS
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=30026b69015db3f82407df83dc1118518ee1fa5c
commit 30026b69015db3f82407df83dc1118518ee1fa5c
Author: Allan McRae <allan@archlinux.org>
Date: Sat Jun 21 17:23:55 2014 +1000
Mention CVE-2014-4043 in NEWS
(cherry picked from commit d03efb2f979defd473955a455d66b949961d26b2)
Conflicts:
NEWS
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=e698ea2c03ddfdfa87459c1a0e53e2a4289de0fa
commit e698ea2c03ddfdfa87459c1a0e53e2a4289de0fa
Author: Florian Weimer <fweimer@redhat.com>
Date: Wed Jun 11 23:12:52 2014 +0200
posix_spawn_file_actions_addopen needs to copy the path argument (BZ 17048)
POSIX requires that we make a copy, so we allocate a new string
and free it in posix_spawn_file_actions_destroy.
Reported by David Reid, Alex Gaynor, and Glyph Lefkowitz. This bug
may have security implications.
(cherry picked from commit 89e435f3559c53084498e9baad22172b64429362)
Conflicts:
NEWS
-----------------------------------------------------------------------
--
You are receiving this mail because:
You are on the CC list for the bug.