Contributed by jose on from the where-did-that-page-go? dept.
Date: Wed, 8 Oct 2003 16:23:56 -0600 (MDT) From: Ted UnangstThe net effect of this is to make it harder for attackers to get the alignments of their exploits right, helping to increase the resilience of OpenBSD to common attacks.
CVSROOT: /cvs Module name: src Changes by: email@example.com 2003/10/08 16:23:56 Modified files: sys/uvm : uvm_map.c Log message: randomize return from uvm_map_hint. the random increment is limited to prevent fragmentation. this has the effect of randomizing unhinted mmap()s, sysV mem, and position of ld.so. tested on many archs by many developers for quite some time. use of MIN to allow m68k to play from miod@. vax is not included. ok deraadt@ miod@
(Comments are closed)