diff options
| author | Franz Pletz <fpletz@fnordicwalking.de> | 2016-09-12 02:28:26 +0200 |
|---|---|---|
| committer | Franz Pletz <fpletz@fnordicwalking.de> | 2016-09-12 02:36:11 +0200 |
| commit | 3ba99f83a7acd8644880b62aea5e3b31e1f1b57a (patch) | |
| tree | db0c92eb72ada47b31b01bba43dbe107ddef5db0 /pkgs/development/python-modules/rangehttpserver | |
| parent | e0b5eef4e7d21d0a914e248635f1f9360772a6d9 (diff) | |
glibc: enable stackprotection hardening
Enables previously manually disabled stackprotector and stackguard
randomization.
From https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511811:
If glibc is built with the --enable-stackguard-randomization option,
each application gets a random canary value (at runtime) from /dev/urandom.
If --enable-stackguard-randomization is absent, applications get a static
canary value of "0xff0a0000". This is very unfortunate, because the
attacker may be able to bypass the stack protection mechanism, by placing
those 4 bytes in the canary word, before the actual canary check is
performed (for example in memcpy-based buffer overflows).
Diffstat (limited to 'pkgs/development/python-modules/rangehttpserver')
0 files changed, 0 insertions, 0 deletions
