lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20051011123916.42694.qmail@web35701.mail.mud.yahoo.com> Date: Tue Oct 11 14:49:26 2005 From: justliketocode at yahoo.com (none none) Subject: http://prdelka.blackart.org.uk/paperz/VAstacksmash.txt Can you point out where in the kernel tree this randomization has been done? I havent seen anything on LKML explaining this. >Linux kernel recently incorporated a protection which >randomizes the stack making exploitation of >stack based overflows more difficult. I present here >an attack which works on exploiting static >addresses in Linux. You should be familiar with >standard stack smashing before attempting this >paper. >Thank you. __________________________________ Yahoo! Mail - PC Magazine Editors' Choice 2005 http://mail.yahoo.com