lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040223212523.19269128@nausicaa>
From: ralf at camperquake.de (Ralf Ertzinger)
Subject: Coming soon: CPU fix for buffer overflows

Hi.

"Richard M. Smith" <rms@...puterbytesman.com> wrote:

> AMD's Athlon-64 (for PCs) and Opteron (for servers) will protect against
> buffer overflows when used with a new version of Windows XP. Intel plans
> similar features on next generation Pentium chips.

If I'm not mistaken, this is just about AMD (and Intel) introducing a real
"no execute" flag to memory page properties, like Sparc (and others)
already have.

Certainly not a bad move, but buffer overflows exist on Sparc, too,
don't they?

-- 
Smile, and everyone will wonder what you're up to.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040223/bd14551a/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ