glibc/sysdeps/sparc
Carlos O'Donell c61b4d41c9 BZ #15754: CVE-2013-4788
The pointer guard used for pointer mangling was not initialized for
static applications resulting in the security feature being disabled.
The pointer guard is now correctly initialized to a random value for
static applications. Existing static applications need to be
recompiled to take advantage of the fix.

The test tst-ptrguard1-static and tst-ptrguard1 add regression
coverage to ensure the pointer guards are sufficiently random
and initialized to a default value.
2013-09-23 00:52:09 -04:00
..
bits
fpu Fix typos. 2013-08-21 19:48:48 +02:00
sparc32 BZ #15754: CVE-2013-4788 2013-09-23 00:52:09 -04:00
sparc64 BZ #15754: CVE-2013-4788 2013-09-23 00:52:09 -04:00
sys
abort-instr.h
backtrace.c
configure
configure.in
crti.S
crtn.S
dl-dtprocnum.h
dl-procinfo.c
dl-procinfo.h Add GLRO(dl_hwcap2) for new AT_HWCAP2 auxv_t a_type. 2013-06-28 16:50:48 -05:00
dl-sysdep.h
dl-tls.h
gccframe.h
ldsodefs.h
machine-gmon.h
Makefile
mempcpy.S
memusage.h
sparc-ifunc.h
sparc-mcount.S
stackinfo.h
Subdirs
sysdep.h