1. 21 May, 2018 5 commits
  2. 04 Apr, 2018 1 commit
    • Baruch Siach's avatar
      Fix build for openrisc with uClibc · f6ed7c27
      Baruch Siach authored
      uClibc defines EM_OR1K instead of EM_OPENRISC for the OpenRISC ELF
      e_machine ID. Use EM_OR1K when EM_OPENRISC is not defined.
      
      This fixes the following build failure:
      
      In file included from nlist.c:44:0:
      nlist.c: In function ‘__elf_is_okay__’:
      local-elf.h:224:23: error: ‘EM_OPENRISC’ undeclared (first use in this function)
       #define ELF_TARG_MACH EM_OPENRISC
                             ^
      nlist.c:77:26: note: in expansion of macro ‘ELF_TARG_MACH’
         if (ehdr->e_machine == ELF_TARG_MACH &&
                                ^
      Signed-off-by: Guillem Jover's avatarGuillem Jover <guillem@hadrons.org>
      f6ed7c27
  3. 06 Mar, 2018 1 commit
  4. 04 Mar, 2018 2 commits
  5. 16 Jul, 2017 1 commit
    • Guillem Jover's avatar
      Fix handling of non-contiguous argv + envp in setproctitle() · 2a8514d8
      Guillem Jover authored
      The two arrays might not reference contiguous memory, and assuming they
      are does break at least now on GNU/Hurd, which contains an unmapped
      memory block between the memory used by the two arrays.
      
      Just check that each element is strictly after the previous one, so that
      we know there are no unmapped memory blocks inbetween.
      2a8514d8
  6. 24 Jun, 2017 2 commits
  7. 19 Jun, 2017 4 commits
  8. 05 Jun, 2017 3 commits
  9. 16 Jan, 2017 1 commit
  10. 27 Mar, 2016 1 commit
  11. 13 Feb, 2016 2 commits
  12. 07 Feb, 2016 2 commits
  13. 27 Jan, 2016 1 commit
    • Hanno Böck's avatar
      Fix heap buffer overflow in fgetwln() · c8f0723d
      Hanno Böck authored
      In the function fgetwln() there's a 4 byte heap overflow.
      
      There is a while loop that has this check to see whether there's still
      enough space in the buffer:
      
      		if (!fb->len || wused > fb->len) {
      
      If this is true more memory gets allocated. However this test won't be
      true if wused == fb->len, but at that point wused already points out
      of the buffer. Some lines later there's a write to the buffer:
      
      		fb->wbuf[wused++] = wc;
      
      This bug was found with the help of address sanitizer.
      
      Warned-by: ASAN
      Fixes: https://bugs.freedesktop.org/show_bug.cgi?id=93881Signed-off-by: Guillem Jover's avatarGuillem Jover <guillem@hadrons.org>
      c8f0723d
  14. 14 Dec, 2015 1 commit
    • Guillem Jover's avatar
      Add support for GNU/Hurd to getentropy() · 7a756875
      Guillem Jover authored
      Reuse the getentropy code for Linux on the Hurd, which has fallbacks
      for when the better interfaces are not present. And remove all the code
      that is not supported currently on the Hurd. Ideally the Hurd should
      get an equivalent interfaces that does not suffer from the same
      problems as /dev/urandom.
      7a756875
  15. 07 Dec, 2015 1 commit
  16. 02 Dec, 2015 3 commits
  17. 01 Dec, 2015 1 commit
    • Guillem Jover's avatar
      Use local SHA512 header · 8493c7f2
      Guillem Jover authored
      Actually use the local private SHA512 header instead of relying on the
      OpenSSL one for no good reason. Add definition for expected macro
      SHA512_DIGEST_LENGTH.
      8493c7f2
  18. 30 Nov, 2015 5 commits
  19. 24 Sep, 2015 2 commits
  20. 23 Sep, 2015 1 commit