summaryrefslogtreecommitdiff
path: root/pkgs/development/python-modules/rangehttpserver
diff options
context:
space:
mode:
authorFranz Pletz <fpletz@fnordicwalking.de>2016-09-12 02:28:26 +0200
committerFranz Pletz <fpletz@fnordicwalking.de>2016-09-12 02:36:11 +0200
commit3ba99f83a7acd8644880b62aea5e3b31e1f1b57a (patch)
treedb0c92eb72ada47b31b01bba43dbe107ddef5db0 /pkgs/development/python-modules/rangehttpserver
parente0b5eef4e7d21d0a914e248635f1f9360772a6d9 (diff)
glibc: enable stackprotection hardening
Enables previously manually disabled stackprotector and stackguard randomization. From https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511811: If glibc is built with the --enable-stackguard-randomization option, each application gets a random canary value (at runtime) from /dev/urandom. If --enable-stackguard-randomization is absent, applications get a static canary value of "0xff0a0000". This is very unfortunate, because the attacker may be able to bypass the stack protection mechanism, by placing those 4 bytes in the canary word, before the actual canary check is performed (for example in memcpy-based buffer overflows).
Diffstat (limited to 'pkgs/development/python-modules/rangehttpserver')
0 files changed, 0 insertions, 0 deletions