-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Arjan van de Ven wrote: > On Thu, 2005-01-27 at 12:45 +0100, Julien TINNES wrote: > >>Arjan van de Ven wrote: >> >>>The randomisation patch series introduces infrastructure and functionality >>>that causes certain parts of a process' virtual address space to be >>>different for each invocation of the process. The purpose of this is to >>>raise the bar on buffer overflow exploits; full randomisation makes it not >>>possible to use absolute addresses in the exploit. >>> >> >>I think it is worth mentioning that this is part of PaX ASLR, but with >>some changes and simplification. > > > it actually came from Exec-Shield not PaX > Yeah, if it came from PaX the randomization would actually be useful. Sorry, I've just woken up and already explained in another post. [...] > > - > To unsubscribe from this list: send the line "unsubscribe linux-kernel" in > the body of a message to [EMAIL PROTECTED] > More majordomo info at http://vger.kernel.org/majordomo-info.html > Please read the FAQ at http://www.tux.org/lkml/ > - -- All content of all messages exchanged herein are left in the Public Domain, unless otherwise explicitly stated. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFB+SfwhDd4aOud5P8RArzvAJ91+7oeFvQyhfH5ovHkkWG7FQcazgCfchDA 4lxXXLmMA5PcZuICxoxnQGU= =oXcE -----END PGP SIGNATURE----- - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/