First published: Thu Apr 07 2016(Updated: )
Binaries compiled against targets that use the libssp library in GCC for stack smashing protection (SSP) might allow local users to perform buffer overflow attacks by leveraging lack of the Object Size Checking feature.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gnu Libssp |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.