libffi requests an executable stack allowing attackers to more easily trigger arbitrary code execution by overwriting the stack. Please note that libffi is used by a number of other libraries. Upstream patch: https://github.com/libffi/libffi/commit/978c9540154d320525488db1b7049277122f736d
Acknowledgments: Name: Qualys Inc
External References: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
Created libffi tracking bugs for this issue: Affects: fedora-all [bug 1462832] Created mingw-libffi tracking bugs for this issue: Affects: epel-7 [bug 1462830] Affects: fedora-all [bug 1462831]