This is the mail archive of the
glibc-bugs@sourceware.org
mailing list for the glibc project.
[Bug libc/10149] New: stack guard should lead with zero byte to gain protections from str* reads
- From: "kees at outflux dot net" <sourceware-bugzilla at sourceware dot org>
- To: glibc-bugs at sources dot redhat dot com
- Date: 12 May 2009 18:05:35 -0000
- Subject: [Bug libc/10149] New: stack guard should lead with zero byte to gain protections from str* reads
- Reply-to: sourceware-bugzilla at sourceware dot org
When building the stack guard, it has been traditionally important to have the
value start (in memory) with a zero byte to protect the guard value (and the
rest of the stack past it) from being read via strcpy, etc.
This patch reduces the number of random bytes by one, leaving the leading zero byte.
--
Summary: stack guard should lead with zero byte to gain
protections from str* reads
Product: glibc
Version: unspecified
Status: NEW
Severity: normal
Priority: P2
Component: libc
AssignedTo: drepper at redhat dot com
ReportedBy: kees at outflux dot net
CC: glibc-bugs at sources dot redhat dot com
http://sourceware.org/bugzilla/show_bug.cgi?id=10149
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.