Bug#535456: libgcrypt11: fails stack-smashing detection on VIA systems
Andreas Metzler
ametzler at downhill.at.eu.org
Thu Jul 2 17:21:40 UTC 2009
On 2009-07-02 Werner Koch <wk at gnupg.org> wrote:
> Incidentally I commited that fix a few minutes ago to the upstream SVN.
> It was lingering around in my working copy for a couple of days. No
> plans for a new libgcrypt 1.4 release, though.
Thanks for following the bts.
There is diffrence between the proposed patch and SVN head, is it
signigicant?
-----------------------
--- /tmp/GCR/libgcrypt-1.4.4/random/rndhw.c 2009-07-02 19:14:07.000000000 +0200
+++ gcryptSVN/random/rndhw.c 2009-07-02 19:06:04.000000000 +0200
@@ -58,7 +58,7 @@ poll_padlock (void (*add)(const void*, s
asm volatile
("movl %1, %%edi\n\t" /* Set buffer. */
"xorl %%edx, %%edx\n\t" /* Request up to 8 bytes. */
- ".byte 0x0f, 0xa7, 0xc0\n" /* XSTORE RNG. */
+ ".byte 0x0f, 0xa7, 0xc0\n\t" /* XSTORE RNG. */
: "=a" (status)
: "g" (p)
: "%edx", "%edi", "cc"
-----------------------
cu and- probably a stupid question -reas
--
`What a good friend you are to him, Dr. Maturin. His other friends are
so grateful to you.'
`I sew his ears on from time to time, sure'
More information about the Pkg-gnutls-maint
mailing list