On 06/19/2018 03:24 PM, Peter Pentchev wrote:
...this came along. So what is supposed to stop an attacker who can
inject arbitrary code into the program from modifying the keys?
Or is this supposed to stop buffer-overflow exploits that overwrite
the GOT and thus cause the attacker's code to be
On Mon, Jun 18, 2018 at 09:28:04AM +0200, Jan Kurik wrote:
> = Proposed System Wide Change: Build non-RELRO ELF binaries with
> .plt.got isolation =
> https://fedoraproject.org/wiki/Changes/.plt.got_Isolation
>
>
> Owner(s):
> * Florian Weimer
>
>
> Fedora 23 enabled hardening for all
= Proposed System Wide Change: Build non-RELRO ELF binaries with
.plt.got isolation =
https://fedoraproject.org/wiki/Changes/.plt.got_Isolation
Owner(s):
* Florian Weimer
Fedora 23 enabled hardening for all packages. However, some ELF
binaries still use lazy binding. This change proposes
= Proposed System Wide Change: Build non-RELRO ELF binaries with
.plt.got isolation =
https://fedoraproject.org/wiki/Changes/.plt.got_Isolation
Owner(s):
* Florian Weimer
Fedora 23 enabled hardening for all packages. However, some ELF
binaries still use lazy binding. This change proposes