Package: elfutils / 0.159-4.2
Metadata
Package | Version | Patches format |
---|---|---|
elfutils | 0.159-4.2 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
redhat portability.diff | (download) |
ChangeLog |
30 30 + 0 - 0 ! |
--- |
hppa_backend.diff | (download) |
backends/Makefile.am |
8 6 + 2 - 0 ! |
--- |
arm_backend.diff | (download) |
backends/arm_init.c |
18 16 + 2 - 0 ! |
--- |
mips_backend.diff | (download) |
backends/Makefile.am |
8 6 + 2 - 0 ! |
--- |
m68k_backend.diff | (download) |
backends/Makefile.am |
8 6 + 2 - 0 ! |
m68k support Written by Kurt Roeckx, except for the retval support which was written by Thorsten Glaser |
testsuite ignore elflint.diff | (download) |
tests/run-elflint-self.sh |
2 1 + 1 - 0 ! |
--- |
scanf format.patch | (download) |
src/addr2line.c |
4 2 + 2 - 0 ! |
use %m[ instead of %a[ in scanf() %a was a gnu extention, but C99 made this a float. So it got changed to %m (supported by glibc 2.7), but %a[ and %as are still supported by glibc. The portability branch changed this from %m to %a again since that's supported by more versions of glibc. However gcc gives a warning about this using -Wformat and we have a new enough libc to use %m. |
mips_readelf_w.patch | (download) |
src/readelf.c |
3 2 + 1 - 0 ! |
make readelf -w output debug information on mips Bug-Debian: http://bugs.debian.org/662041 |
arm_unsupported.patch | (download) |
tests/backtrace-subr.sh |
13 10 + 3 - 0 ! |
tests: backtrace-subr.sh add check_native_unsupported. The special arm check in check_unsupported should only trigger for native tests, otherwise on arm various backtrace tests would be skipped that should work just fine. Signed-off-by: Mark Wielaard <mjw@redhat.com> |
arm_syscall.patch | (download) |
tests/backtrace.c |
3 2 + 1 - 0 ! |
tests: backtrace.c accept __libc_do_syscall as first frame symname. On some architectures (Debian armhf) system calls go through __libc_do_syscall instead of __kernel_vsyscall. Accept either of these symbol names for the first backtrace frame. |
arm_func_value.patch | (download) |
backends/arm_init.c |
1 1 + 0 - 0 ! |
libebl: add sym_func_value hook. The ARM EABI says that the zero bit of function symbol st_value indicates whether the symbol points to a THUMB or ARM function. Add a new ebl hook to adjust the st_value in such a case so that we get the actual value that the symbol points to. It isn't easily possible to reuse the existing resolve_sym_value for this purpose, so we end up with another hook that can be used from dwfl_module_getsym and elflint. |
arm_unwind_ret_mask.patch | (download) |
backends/arm_init.c |
3 3 + 0 - 0 ! |
libebl: add ebl_unwind_ret_mask. Another ARM oddity. A return value address in an unwind will contain an extra bit to indicate whether to return to a regular ARM or THUMB function. Add a new ebl function to return a mask to use to get the actual return address during an unwind ebl_unwind_ret_mask. |
non_linux.patch | (download) |
libdwfl/linux-pid-attach.c |
17 17 + 0 - 0 ! |
--- |
unaligned.patch | (download) |
libdwfl/linux-core-attach.c |
22 11 + 11 - 0 ! |
[patch] libdwfl: linux-core-attach.c handle possible unaligned data access. Use libdw/memory-access.h macros read_4ubyte_unaligned_noncvt and read_8ubyte_unaligned_noncvt to access possibly unaligned data in core files. Signed-off-by: Mark Wielaard <mjw@redhat.com> |
aarch64 run native test fix.patch | (download) |
backends/aarch64_retval.c |
1 1 + 0 - 0 ! |
--- |
CVE 2014 9447.patch | (download) |
libelf/elf_begin.c |
5 1 + 4 - 0 ! |
libelf: fix dir traversal vuln in ar extraction. read_long_names terminates names at the first '/' found but then skips one character without checking (it's supposed to be '\n'). Hence the next name could start with any character including '/'. This leads to a directory traversal vulnerability at the time the contents of the archive is extracted. The danger is mitigated by the fact that only one '/' is possible in a resulting filename and only in the leading position. Hence only files in the root directory can be written via this vuln and only when ar is executed as root. The fix for the vuln is to not skip any characters while looking for '/'. |
arm64.patch | (download) |
backends/aarch64_initreg.c |
9 7 + 2 - 0 ! |
--- |