mirror of
https://sourceware.org/git/glibc.git
synced 2024-12-25 20:21:07 +00:00
c61b4d41c9
The pointer guard used for pointer mangling was not initialized for static applications resulting in the security feature being disabled. The pointer guard is now correctly initialized to a random value for static applications. Existing static applications need to be recompiled to take advantage of the fix. The test tst-ptrguard1-static and tst-ptrguard1 add regression coverage to ensure the pointer guards are sufficiently random and initialized to a default value. |
||
---|---|---|
.. | ||
bits | ||
fpu | ||
sparc32 | ||
sparc64 | ||
sys | ||
abort-instr.h | ||
backtrace.c | ||
configure | ||
configure.in | ||
crti.S | ||
crtn.S | ||
dl-dtprocnum.h | ||
dl-procinfo.c | ||
dl-procinfo.h | ||
dl-sysdep.h | ||
dl-tls.h | ||
gccframe.h | ||
ldsodefs.h | ||
machine-gmon.h | ||
Makefile | ||
mempcpy.S | ||
memusage.h | ||
sparc-ifunc.h | ||
sparc-mcount.S | ||
stackinfo.h | ||
Subdirs | ||
sysdep.h |