Most likely use-after-free issues, but any memory use bug lays the program open to these attacks.
-- Caroline Tice cmt...@google.com On Thu, Nov 8, 2012 at 1:36 AM, Florian Weimer <fwei...@redhat.com> wrote: > On 11/05/2012 06:48 PM, Caroline Tice wrote: > >> As requested, I have split the original patch into two parts: GCC >> changes and runtime library changes. The attached patch is fore the >> gcc changes. > > > Out of curiosity, what's the primary source of wrong vtable values you > expect? User-after-free issues, heap spraying, or something else? > > -- > Florian Weimer / Red Hat Product Security Team