Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | BZ #15754: Fix test case for ARM. | Carlos O'Donell | 2013-09-23 | 1 | -1/+6 |
| | | | | | | | Statically built binaries use __pointer_chk_guard_local, while dynamically built binaries use __pointer_chk_guard. Provide the right definition depending on the test case we are building. | ||||
* | BZ #15754: CVE-2013-4788 | Carlos O'Donell | 2013-09-23 | 1 | -0/+3 |
| | | | | | | | | | | | | The pointer guard used for pointer mangling was not initialized for static applications resulting in the security feature being disabled. The pointer guard is now correctly initialized to a random value for static applications. Existing static applications need to be recompiled to take advantage of the fix. The test tst-ptrguard1-static and tst-ptrguard1 add regression coverage to ensure the pointer guards are sufficiently random and initialized to a default value. | ||||
* | Split up stackguard-macros.h into sysdeps directories. | Joseph Myers | 2012-05-15 | 1 | -0/+4 |