Sanity check the forward and backward chunk pointers in the unlink() macro used by Doug Lea's implementation of malloc(3). If the pointers are determined to have been overwritten, the process will be forced to terminate thereby reducing the impact of a common class of attacks on memory overwrite vulnerabilities present in various applications. Credit for the idea for this countermeasure is due to Stefan Esser.
Created attachment 23529 [details, diff] glibc-2.3.3_pre20031222.ebuild.diff
Created attachment 23530 [details, diff] glibc-2.3.3-owl-malloc-unlink-sanity-check.diff
hrmm aparently I've opened this bug twice. *** This bug has been marked as a duplicate of 38630 ***