[M108 Migration] Add ASLR to executables. 04/288204/2
authorBakka Uday Kiran <b.kiran@samsung.com>
Mon, 13 Feb 2023 15:22:21 +0000 (20:52 +0530)
committerBot Blink <blinkbot@samsung.com>
Tue, 14 Feb 2023 11:54:54 +0000 (11:54 +0000)
commitb58c1b1a0ab398cec71a3b615932f748b35ecfd4
tree80f44403a8f2e2a065f07dfaad8e0f7caeed3272
parentc4588d8283d9cf1aadfb92d03694039faa2891ee
[M108 Migration] Add ASLR to executables.

Address space layout randomization(ASLR) is a computer security
technique involved in preventing exploitation of memory corruption
vulnerabilities.

ASLR randomly arranges the address space positions of key data areas of
a process to prevent an attacker from reliably jumping to a particular
exploited function in memory.

This adds ASLR to ubrowser, efl_webview_app, mini_browser, and efl_webprocess.

* Output from a command in bash to check ASLR

$ hardening-check ubrowser
ubrowser:
Position Independent Executable: yes

$ file ubrowser
ubrowser: ELF 32-bit LSB  shared object

Reference: https://review.tizen.org/gerrit/c/280956

Change-Id: I6e429acd73c01f85bda743c46a47cac6fc298bd4
Signed-off-by: Bakka Uday Kiran <b.kiran@samsung.com>
tizen_src/ewk/efl_integration/BUILD.gn
tizen_src/ewk/efl_webview_app/BUILD.gn
tizen_src/ewk/ubrowser/BUILD.gn