This is the mail archive of the
mailing list for the libc-ports project.
All machines: Pointer guard testing update (Bug 15754, CVE-2013-4788).
- From: "Carlos O'Donell" <carlos at redhat dot com>
- To: "libc-ports at sourceware dot org" <libc-ports at sourceware dot org>
- Date: Thu, 26 Sep 2013 10:52:23 -0400
- Subject: All machines: Pointer guard testing update (Bug 15754, CVE-2013-4788).
- Authentication-results: sourceware.org; auth=none
The fix for CVE-2013-4788 (bug 15754) contains a regression
test to ensure that the pointer guard is both random and
changes between processes.
In order to create the test it was necessary to add a new
accessor macro POINTER_CHK_GUARD to allow the regression
test to locate and read the pointer guard value from outside
of the library.
I have added a POINTER_CHK_GUARD implementation for *all*
machines. You need not do any work at this point. However,
for some machines I wrote the implementation without testing
it e.g. stack guard was just before pointer guard so
POINTER_CHK_GUARD is the same code with a different offset.
My request is that you run the testsuite and verify that
tst-ptrguard1 and tst-ptrguard1-static pass. If they don't
pass please email me and we can work out what might be
wrong with your POINTER_CHK_GUARD implementation.