On Tue, 13 Dec 2005 13:37:22 -0500, Stephen Smalley wrote: >> I thought that in order to get malicious code into a running program with >> any degree of reliability you need to know its VMA layout, and execshield >> prevents that. So how can you do attacks like this with execshield enabled? > > http://www.stanford.edu/~blp/papers/asrandom.pdf Interesting paper, thanks. I guess that answers my question pretty well. It's nice to know it's still (mostly) effective on 64 bit systems though. thanks -mike -- fedora-selinux-list mailing list fedora-selinux-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/fedora-selinux-list