mirror of
git://sourceware.org/git/glibc.git
synced 2025-02-11 12:50:58 +08:00
The pointer guard used for pointer mangling was not initialized for static applications resulting in the security feature being disabled. The pointer guard is now correctly initialized to a random value for static applications. Existing static applications need to be recompiled to take advantage of the fix. The test tst-ptrguard1-static and tst-ptrguard1 add regression coverage to ensure the pointer guards are sufficiently random and initialized to a default value. |
||
---|---|---|
.. | ||
bits | ||
multiarch | ||
__longjmp.c | ||
add_n.S | ||
addmul_1.S | ||
backtrace.c | ||
bcopy.S | ||
bsd-_setjmp.S | ||
bsd-setjmp.S | ||
bzero.S | ||
configure | ||
configure.in | ||
crti.S | ||
crtn.S | ||
dl-machine.h | ||
dl-trampoline.S | ||
Implies | ||
Makefile | ||
memchr.S | ||
memcmp.S | ||
memcpy.S | ||
memset.S | ||
mul_1.S | ||
s390-mcount.S | ||
setjmp.S | ||
stackguard-macros.h | ||
start.S | ||
strcmp.S | ||
strcpy.S | ||
strncpy.S | ||
sub_n.S | ||
sysdep.h | ||
tls-macros.h | ||
tst-audit.h | ||
Versions |