lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 15 Aug 2003 01:01:08 +0300 (EEST) From: noir <noir@....linux.org.tr> To: bugtraq@...urityfocus.com Subject: Re: Buffer overflow prevention I believe that Mr. Raadt meant PAX by W^X. We all enjoy ascii art but I wanted to note that renaming somebody elses work is not so ethical. so for the real thing please consider checking: http://pageexec.virtualave.net/ my linux box have 0 remotely exploitable vulnerabilities in its default install since the begining of time and space. thanks to segmentation, ASLR from the PAX project. Thanks, - noir -----Original Message----- From: Theo de Raadt [mailto:deraadt@....openbsd.org] Sent: Thursday, August 14, 2003 12:37 PM To: Mariusz Woloszyn Subject: Re: Buffer overflow prevention > I believe the best protection (at this time) is to combine ProPolice > with a W^X technology.
Powered by blists - more mailing lists