glibc/sysdeps/sparc/sparc64
Carlos O'Donell c61b4d41c9 BZ #15754: CVE-2013-4788
The pointer guard used for pointer mangling was not initialized for
static applications resulting in the security feature being disabled.
The pointer guard is now correctly initialized to a random value for
static applications. Existing static applications need to be
recompiled to take advantage of the fix.

The test tst-ptrguard1-static and tst-ptrguard1 add regression
coverage to ensure the pointer guards are sufficiently random
and initialized to a default value.
2013-09-23 00:52:09 -04:00
..
bits
fpu
multiarch
soft-fp Fix leading whitespaces. 2013-06-06 20:36:07 +02:00
add_n.S
addmul_1.S
align-cpy.S
backtrace.h
bzero.c
dl-irel.h
dl-machine.h
dl-plt.h
dl-trampoline.S
hp-timing.c
hp-timing.h
Implies
jmpbuf-unwind.h
lshift.S
Makefile
memchr.S
memcmp.S
memcpy.S
memset.S
mul_1.S
rawmemchr.S
rshift.S
rtld-memcpy.c
rtld-memset.c
stackguard-macros.h BZ #15754: CVE-2013-4788 2013-09-23 00:52:09 -04:00
start.S
stpcpy.S
stpncpy.S
strcat.S
strchr.S
strcmp.S
strcpy.S
strcspn.S
strlen.S
strncmp.S
strncpy.S
strpbrk.S
strrchr.c
strspn.S
sub_n.S
submul_1.S
tls-macros.h
tst-audit.h
Versions