From c61b4d41c9647a54a329aa021341c0eb032b793e Mon Sep 17 00:00:00 2001 From: Carlos O'Donell Date: Mon, 23 Sep 2013 00:52:09 -0400 Subject: BZ #15754: CVE-2013-4788 The pointer guard used for pointer mangling was not initialized for static applications resulting in the security feature being disabled. The pointer guard is now correctly initialized to a random value for static applications. Existing static applications need to be recompiled to take advantage of the fix. The test tst-ptrguard1-static and tst-ptrguard1 add regression coverage to ensure the pointer guards are sufficiently random and initialized to a default value. --- elf/tst-ptrguard1-static.c | 1 + 1 file changed, 1 insertion(+) create mode 100644 elf/tst-ptrguard1-static.c (limited to 'elf/tst-ptrguard1-static.c') diff --git a/elf/tst-ptrguard1-static.c b/elf/tst-ptrguard1-static.c new file mode 100644 index 0000000000..7aff3b7b5d --- /dev/null +++ b/elf/tst-ptrguard1-static.c @@ -0,0 +1 @@ +#include "tst-ptrguard1.c" -- cgit v1.2.3