diff options
| author | Carlos O'Donell <carlos@redhat.com> | 2013-09-23 00:52:09 -0400 |
|---|---|---|
| committer | Allan McRae <allan@archlinux.org> | 2013-10-25 23:56:33 +1000 |
| commit | f03cfdf9bf62f776338171fe2ba6eebbf8948875 (patch) | |
| tree | ac395dd9877a717a0b4acb00ea9998ff4479d318 /scripts/check-execstack.awk | |
| parent | 6957bcb15456b5118c44bb49754b199462336639 (diff) | |
| download | glibc-f03cfdf9bf62f776338171fe2ba6eebbf8948875.tar.xz glibc-f03cfdf9bf62f776338171fe2ba6eebbf8948875.zip | |
BZ #15754: CVE-2013-4788
The pointer guard used for pointer mangling was not initialized for
static applications resulting in the security feature being disabled.
The pointer guard is now correctly initialized to a random value for
static applications. Existing static applications need to be
recompiled to take advantage of the fix.
The test tst-ptrguard1-static and tst-ptrguard1 add regression
coverage to ensure the pointer guards are sufficiently random
and initialized to a default value.
Conflicts:
NEWS
ports/ChangeLog.ia64
ports/ChangeLog.tile
Diffstat (limited to 'scripts/check-execstack.awk')
0 files changed, 0 insertions, 0 deletions
