Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 21 Jun 2017 12:46:28 +0200
From: Agostino Sarubbo <>
Subject: Re: Qualys Security Advisory - The Stack Clash

On Monday 19 June 2017 08:28:43 Qualys Security Advisory wrote:
> III. Solutions
> - Recompile all userland code (, libraries, binaries) with GCC's
>   "-fstack-check" option, which prevents the stack-pointer from moving
>   into another memory region without accessing the stack guard-page (it
>   writes one word to every 4KB page allocated on the stack).

For the record, Gentoo Hardened enables by default -fstack-check=specific

Agostino Sarubbo
Gentoo Linux Developer

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ