glibc/sysdeps
Carlos O'Donell c61b4d41c9 BZ #15754: CVE-2013-4788
The pointer guard used for pointer mangling was not initialized for
static applications resulting in the security feature being disabled.
The pointer guard is now correctly initialized to a random value for
static applications. Existing static applications need to be
recompiled to take advantage of the fix.

The test tst-ptrguard1-static and tst-ptrguard1 add regression
coverage to ensure the pointer guards are sufficiently random
and initialized to a default value.
2013-09-23 00:52:09 -04:00
..
generic BZ #15754: CVE-2013-4788 2013-09-23 00:52:09 -04:00
gnu Remove --disable-versioning. 2013-09-04 15:25:42 +00:00
i386 BZ #15754: CVE-2013-4788 2013-09-23 00:52:09 -04:00
ieee754 Consolidate common code into macros 2013-09-19 20:34:45 +05:30
init_array Add sysdeps/init_array to produce empty crt[in].o and use .preinit_array for gcrt1.o 2013-03-12 12:50:13 -07:00
mach Fix typos. 2013-08-30 18:08:59 +02:00
posix Use __glibc_unlikely instead of __builtin_expect (..., 0) 2013-08-28 09:44:19 +05:30
powerpc BZ #15754: CVE-2013-4788 2013-09-23 00:52:09 -04:00
pthread Fix typos. 2013-08-21 19:48:48 +02:00
s390 BZ #15754: CVE-2013-4788 2013-09-23 00:52:09 -04:00
sh Add sh4 implementation of fegetexceptflag. 2013-06-21 18:07:31 +09:00
sparc BZ #15754: CVE-2013-4788 2013-09-23 00:52:09 -04:00
unix Add O_TMPFILE to <fcntl.h> 2013-09-11 11:52:46 +02:00
wordsize-32 Remove --disable-versioning. 2013-09-04 15:25:42 +00:00
wordsize-64 Move dummy glob64.c alongside glob.c that defines glob64. 2013-05-06 16:11:11 -07:00
x86 Fix typos. 2013-08-21 19:48:48 +02:00
x86_64 BZ #15754: CVE-2013-4788 2013-09-23 00:52:09 -04:00