mirror of
https://sourceware.org/git/glibc.git
synced 2024-11-25 10:43:34 +08:00
c61b4d41c9
The pointer guard used for pointer mangling was not initialized for static applications resulting in the security feature being disabled. The pointer guard is now correctly initialized to a random value for static applications. Existing static applications need to be recompiled to take advantage of the fix. The test tst-ptrguard1-static and tst-ptrguard1 add regression coverage to ensure the pointer guards are sufficiently random and initialized to a default value. |
||
---|---|---|
.. | ||
abi-note.S | ||
check_fds.c | ||
dso_handle.c | ||
elf-init.c | ||
errno-loc.c | ||
errno.c | ||
gmon-start.c | ||
init-first.c | ||
init.c | ||
libc-start.c | ||
libc-tls.c | ||
Makefile | ||
start.c | ||
sysdep.c | ||
tst-atomic-long.c | ||
tst-atomic.c | ||
tst-empty.c | ||
version.c | ||
Versions |