Re: How to enable/disable security features on mmap() ?
From: Arjan van de Ven
Date: Thu Dec 08 2005 - 11:21:21 EST
On Thu, 2005-12-08 at 17:20 +0100, Xavier Bestel wrote:
> If you only randomize by one or two bytes, the attacker just has to
> retry once or twice to have his exploit work.
in addition the stack pointer needs to be 16 byte aligned in the first
place ;)
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/