Bug#535456: libgcrypt11: fails stack-smashing detection on VIA systems

Andreas Metzler ametzler at downhill.at.eu.org
Thu Jul 2 17:21:40 UTC 2009


On 2009-07-02 Werner Koch <wk at gnupg.org> wrote:
> Incidentally I commited that fix a few minutes ago to the upstream SVN.
> It was lingering around in my working copy for a couple of days.  No
> plans for a new libgcrypt 1.4 release, though.

Thanks for following the bts.

There is diffrence between the proposed patch and SVN head, is it
signigicant?
-----------------------
--- /tmp/GCR/libgcrypt-1.4.4/random/rndhw.c	2009-07-02 19:14:07.000000000 +0200
+++ gcryptSVN/random/rndhw.c	2009-07-02 19:06:04.000000000 +0200
@@ -58,7 +58,7 @@ poll_padlock (void (*add)(const void*, s
       asm volatile
         ("movl %1, %%edi\n\t"         /* Set buffer.  */
          "xorl %%edx, %%edx\n\t"      /* Request up to 8 bytes.  */
-         ".byte 0x0f, 0xa7, 0xc0\n"   /* XSTORE RNG. */
+         ".byte 0x0f, 0xa7, 0xc0\n\t" /* XSTORE RNG. */
          : "=a" (status)
          : "g" (p)
          : "%edx", "%edi", "cc"
-----------------------

cu and- probably a stupid question -reas
-- 
`What a good friend you are to him, Dr. Maturin. His other friends are
so grateful to you.'
`I sew his ears on from time to time, sure'





More information about the Pkg-gnutls-maint mailing list