aboutsummaryrefslogtreecommitdiff
path: root/scripts/check-execstack.awk
diff options
context:
space:
mode:
authorCarlos O'Donell <carlos@redhat.com>2013-09-23 00:52:09 -0400
committerAllan McRae <allan@archlinux.org>2013-10-25 23:56:33 +1000
commitf03cfdf9bf62f776338171fe2ba6eebbf8948875 (patch)
treeac395dd9877a717a0b4acb00ea9998ff4479d318 /scripts/check-execstack.awk
parent6957bcb15456b5118c44bb49754b199462336639 (diff)
downloadglibc-f03cfdf9bf62f776338171fe2ba6eebbf8948875.tar.xz
glibc-f03cfdf9bf62f776338171fe2ba6eebbf8948875.zip
BZ #15754: CVE-2013-4788
The pointer guard used for pointer mangling was not initialized for static applications resulting in the security feature being disabled. The pointer guard is now correctly initialized to a random value for static applications. Existing static applications need to be recompiled to take advantage of the fix. The test tst-ptrguard1-static and tst-ptrguard1 add regression coverage to ensure the pointer guards are sufficiently random and initialized to a default value. Conflicts: NEWS ports/ChangeLog.ia64 ports/ChangeLog.tile
Diffstat (limited to 'scripts/check-execstack.awk')
0 files changed, 0 insertions, 0 deletions