lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CABniQZOm+UmavomKw3iWDw5faqoE9xOgDMpVxHMRXAbngciqDw@mail.gmail.com> Date: Fri, 5 Dec 2014 19:58:43 +0800 From: Shawn <citypw@...il.com> To: oss-security@...ts.openwall.com Cc: fulldisclosure@...lists.org, bugs@...uritytracker.com, full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com, submissions@...ketstormsecurity.org Subject: Re: [FD] [oss-security] Offset2lib: bypassing full ASLR on 64bit Linux Hi Agostino, I don't think this issue impact on Grsecurity/PaX, which Hardened-Gentoo is using PaX. On Fri, Dec 5, 2014 at 7:10 PM, Agostino Sarubbo <ago@...too.org> wrote: > On Gentoo (Hardened) I always get form > ./get_offset2lib: > > Offset2lib (libc): 0x0 > > > -- > Agostino Sarubbo > Gentoo Linux Developer -- GNU powered it... GPL protect it... God blessing it... regards Shawn _______________________________________________ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists