mirror of git://sourceware.org/git/glibc.git
The pointer guard used for pointer mangling was not initialized for static applications resulting in the security feature being disabled. The pointer guard is now correctly initialized to a random value for static applications. Existing static applications need to be recompiled to take advantage of the fix. The test tst-ptrguard1-static and tst-ptrguard1 add regression coverage to ensure the pointer guards are sufficiently random and initialized to a default value. |
||
|---|---|---|
| .. | ||
| bits | ||
| fpu | ||
| sparc32 | ||
| sparc64 | ||
| sys | ||
| Makefile | ||
| Subdirs | ||
| abort-instr.h | ||
| backtrace.c | ||
| configure | ||
| configure.in | ||
| crti.S | ||
| crtn.S | ||
| dl-dtprocnum.h | ||
| dl-procinfo.c | ||
| dl-procinfo.h | ||
| dl-sysdep.h | ||
| dl-tls.h | ||
| gccframe.h | ||
| ldsodefs.h | ||
| machine-gmon.h | ||
| mempcpy.S | ||
| memusage.h | ||
| sparc-ifunc.h | ||
| sparc-mcount.S | ||
| stackinfo.h | ||
| sysdep.h | ||