about summary refs log tree commit diff
path: root/src/libstd/sys/unix/stack_overflow.rs
diff options
context:
space:
mode:
authorRalf Jung <post@ralfj.de>2020-06-20 16:39:57 +0200
committerGitHub <noreply@github.com>2020-06-20 16:39:57 +0200
commit96b86ea1a8989352798e6145fbb7c150470bc5c0 (patch)
treedcb813067116788e4bfed678e0ab72fdc421b76e /src/libstd/sys/unix/stack_overflow.rs
parent7930ee68746249238ecaa846ebfa2bcdc97b1da7 (diff)
parent33b304c5e0a620350e0eba0ceda2aab23f3b4e6f (diff)
downloadrust-96b86ea1a8989352798e6145fbb7c150470bc5c0.tar.gz
rust-96b86ea1a8989352798e6145fbb7c150470bc5c0.zip
Rollup merge of #73471 - raoulstrackx:raoul/fpu_tag_word, r=jethrogb
Prevent attacker from manipulating FPU tag word used in SGX enclave

Insufficient sanitization of the x87 FPU tag word in the trusted enclave runtime allowed unprivileged adversaries in the containing host application to induce incoherent or unexpected results for ABI-compliant compiled enclave application code that uses the x87 FPU.

Vulnerability was disclosed to us by Fritz Alder, Jo Van Bulck, David Oswald and Frank Piessens

cc: @jethrogb
Diffstat (limited to 'src/libstd/sys/unix/stack_overflow.rs')
0 files changed, 0 insertions, 0 deletions