mirror of git://sourceware.org/git/glibc.git
The pointer guard used for pointer mangling was not initialized for static applications resulting in the security feature being disabled. The pointer guard is now correctly initialized to a random value for static applications. Existing static applications need to be recompiled to take advantage of the fix. The test tst-ptrguard1-static and tst-ptrguard1 add regression coverage to ensure the pointer guards are sufficiently random and initialized to a default value. |
||
|---|---|---|
| .. | ||
| bits | ||
| fpu | ||
| multiarch | ||
| soft-fp | ||
| Implies | ||
| Makefile | ||
| Versions | ||
| add_n.S | ||
| addmul_1.S | ||
| align-cpy.S | ||
| backtrace.h | ||
| bzero.c | ||
| dl-irel.h | ||
| dl-machine.h | ||
| dl-plt.h | ||
| dl-trampoline.S | ||
| hp-timing.c | ||
| hp-timing.h | ||
| jmpbuf-unwind.h | ||
| lshift.S | ||
| memchr.S | ||
| memcmp.S | ||
| memcpy.S | ||
| memset.S | ||
| mul_1.S | ||
| rawmemchr.S | ||
| rshift.S | ||
| rtld-memcpy.c | ||
| rtld-memset.c | ||
| stackguard-macros.h | ||
| start.S | ||
| stpcpy.S | ||
| stpncpy.S | ||
| strcat.S | ||
| strchr.S | ||
| strcmp.S | ||
| strcpy.S | ||
| strcspn.S | ||
| strlen.S | ||
| strncmp.S | ||
| strncpy.S | ||
| strpbrk.S | ||
| strrchr.c | ||
| strspn.S | ||
| sub_n.S | ||
| submul_1.S | ||
| tls-macros.h | ||
| tst-audit.h | ||