[PATCH] Vtable pointer verification, gcc changes (patch 2 of 2)

Caroline Tice cmtice@google.com
Thu Nov 8 16:56:00 GMT 2012


Most likely use-after-free issues, but any memory use bug lays the
program open to these attacks.

-- Caroline Tice
cmtice@google.com


On Thu, Nov 8, 2012 at 1:36 AM, Florian Weimer <fweimer@redhat.com> wrote:
> On 11/05/2012 06:48 PM, Caroline Tice wrote:
>
>> As requested, I have split the original patch into two parts: GCC
>> changes and runtime library changes.  The attached patch is fore the
>> gcc changes.
>
>
> Out of curiosity, what's the primary source of wrong vtable values you
> expect?  User-after-free issues, heap spraying, or something else?
>
> --
> Florian Weimer / Red Hat Product Security Team



More information about the Gcc-patches mailing list