|| ||Ingo Molnar <email@example.com>|
|| ||[patch] exec-shield-2.4.21-rc1-C5|
|| ||Mon, 5 May 2003 12:20:21 -0400 (EDT)|
a new (-C5) release of the exec-shield patch can be found at:
Changes since -B6:
- removed the X_workaround - chstk can be used for equivalent
functionality. (issue raised by Yoav Weiss)
- increase SHLIB_BASE from 1MB to 1MB + 64KB, suggested by Alexandre
Julliard, to fix DOS loaders.
- fix Pentium/i386 compilation failure in fault.c. (reported by Johannes
- fix signal return bug, found by firstname.lastname@example.org.
- shared library address randomization, both within and outside the
ASCII-shield. This should make remote attacks a little bit more
- process stack randomization. A number of other patches did this as
well, it generally helps. (There's no memory wasted because the stack
area left out will simply not be paged in.)
- turn off shlib relocation if the stack is executable. This is needed
for Wine, qemu and other apps that need the low memory range.
- do not show the wchan field of non-owned processes, and do not show the
maps file either. This should make it a little bit harder to guess
library locations for local attackers.
most of the new stuff in this patch (randomization, information filtering)
has been done in other patches as well (such as PaX, grsecurity, non-exec
stack patch, etc.) - i tried to filter out and add the ones that matter
most, do not introduce constraints and are thus uncontroversial.
bug reports, suggestions welcome.
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to email@example.com
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/