lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20120516201348.GB6678@suse.de> Date: Wed, 16 May 2012 22:13:48 +0200 From: Marcus Meissner <meissner@...e.de> To: Nicolas Surribas <nicolas.surribas@...il.com> Cc: full-disclosure@...ts.grok.org.uk Subject: Re: The story of the Linux kernel 3.x... On Wed, May 16, 2012 at 07:54:13PM +0200, Nicolas Surribas wrote: > I can't reproduce with current openSUSE 12.1... > > sh-4.2$ uname -rop > 3.1.10-1.9-desktop x86_64 GNU/Linux > sh-4.2$ lsb-release -ri > Distributor ID: SUSE LINUX > Release: 12.1 > sh-4.2$ cat /proc/self/maps | grep vdso > 7fff48b58000-7fff48b59000 r-xp 00000000 00:00 0 [vdso] > sh-4.2$ cat /proc/self/maps | grep vdso > 7fffabbff000-7fffabc00000 r-xp 00000000 00:00 0 [vdso] > sh-4.2$ cat /proc/sys/kernel/randomize_va_space > 1 x86_64 is a bit different. openSUSE 12.1 x86 (32bit) still uses COMPAT_VDSO, as it was never really clear what kind of applications would break if disabled. The next openSUSE, openSUSE 12.2, will have the 32bit VDSO randomized. Also, randomize_va_space will be 2 (heap randomization too for PIE binaries). Ciao, Marcus _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists