glibc/csu
Carlos O'Donell c61b4d41c9 BZ #15754: CVE-2013-4788
The pointer guard used for pointer mangling was not initialized for
static applications resulting in the security feature being disabled.
The pointer guard is now correctly initialized to a random value for
static applications. Existing static applications need to be
recompiled to take advantage of the fix.

The test tst-ptrguard1-static and tst-ptrguard1 add regression
coverage to ensure the pointer guards are sufficiently random
and initialized to a default value.
2013-09-23 00:52:09 -04:00
..
abi-note.S
check_fds.c Fix typos. 2013-08-21 19:48:48 +02:00
dso_handle.c
elf-init.c Add sysdeps/init_array to produce empty crt[in].o and use .preinit_array for gcrt1.o 2013-03-12 12:50:13 -07:00
errno-loc.c
errno.c
gmon-start.c Add sysdeps/init_array to produce empty crt[in].o and use .preinit_array for gcrt1.o 2013-03-12 12:50:13 -07:00
init-first.c Fix static-binary lazy FPU context allocation 2013-09-09 22:36:57 +01:00
init.c
libc-start.c BZ #15754: CVE-2013-4788 2013-09-23 00:52:09 -04:00
libc-tls.c Make _dl_phdr pointer to const. 2013-03-28 15:39:32 -07:00
Makefile
start.c
sysdep.c
tst-atomic-long.c
tst-atomic.c
tst-empty.c
version.c
Versions