glibc/sysdeps/s390/s390-64
Carlos O'Donell c61b4d41c9 BZ #15754: CVE-2013-4788
The pointer guard used for pointer mangling was not initialized for
static applications resulting in the security feature being disabled.
The pointer guard is now correctly initialized to a random value for
static applications. Existing static applications need to be
recompiled to take advantage of the fix.

The test tst-ptrguard1-static and tst-ptrguard1 add regression
coverage to ensure the pointer guards are sufficiently random
and initialized to a default value.
2013-09-23 00:52:09 -04:00
..
bits
multiarch
Implies
Makefile
__longjmp.c
add_n.S
backtrace.c
bcopy.S
bsd-_setjmp.S
bsd-setjmp.S
bzero.S
configure
configure.in
crti.S
crtn.S
dl-machine.h
dl-trampoline.S
iso-8859-1_cp037_z900.c
memchr.S
memcmp.S
memcpy.S
memset.S
s390x-mcount.S
setjmp.S
stackguard-macros.h BZ #15754: CVE-2013-4788 2013-09-23 00:52:09 -04:00
start.S
strcmp.S
strcpy.S
strncpy.S
sub_n.S
sysdep.h
tls-macros.h
tst-audit.h
utf8-utf16-z9.c
utf8-utf32-z9.c
utf16-utf32-z9.c