Re: How to enable/disable security features on mmap() ?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 8 Dec 2005, Arjan van de Ven wrote:

> On Thu, 2005-12-08 at 17:20 +0100, Xavier Bestel wrote:
>> If you only randomize by one or two bytes, the attacker just has to
>> retry once or twice to have his exploit work.
>
> in addition the stack pointer needs to be 16 byte aligned in the first
> place ;)
>

No. The stack-pointer is most efficient on ix86 machines if it is
aligned on an ESP-sized boundary (32 bits). Any DATA allocated on
the stack __should__ be aligned to take any data-type, i.e., 16 bytes
to accommodate floating-point variables.

Cheers,
Dick Johnson
Penguin : Linux version 2.6.13.4 on an i686 machine (5589.55 BogoMips).
Warning : 98.36% of all statistics are fiction.
.

****************************************************************
The information transmitted in this message is confidential and may be privileged.  Any review, retransmission, dissemination, or other use of this information by persons or entities other than the intended recipient is prohibited.  If you are not the intended recipient, please notify Analogic Corporation immediately - by replying to this message or by sending an email to [email protected] - and destroy all copies of this information, including any attachments, without reading or disclosing them.

Thank you.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

[Index of Archives]     [Kernel Newbies]     [Netfilter]     [Bugtraq]     [Photo]     [Stuff]     [Gimp]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Video 4 Linux]     [Linux for the blind]     [Linux Resources]
  Powered by Linux