mirror of git://sourceware.org/git/glibc.git
The pointer guard used for pointer mangling was not initialized for static applications resulting in the security feature being disabled. The pointer guard is now correctly initialized to a random value for static applications. Existing static applications need to be recompiled to take advantage of the fix. The test tst-ptrguard1-static and tst-ptrguard1 add regression coverage to ensure the pointer guards are sufficiently random and initialized to a default value. |
||
|---|---|---|
| .. | ||
| Makefile | ||
| Versions | ||
| abi-note.S | ||
| check_fds.c | ||
| dso_handle.c | ||
| elf-init.c | ||
| errno-loc.c | ||
| errno.c | ||
| gmon-start.c | ||
| init-first.c | ||
| init.c | ||
| libc-start.c | ||
| libc-tls.c | ||
| start.c | ||
| sysdep.c | ||
| tst-atomic-long.c | ||
| tst-atomic.c | ||
| tst-empty.c | ||
| version.c | ||