Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S263011AbTEBRAY (ORCPT ); Fri, 2 May 2003 13:00:24 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S263015AbTEBRAY (ORCPT ); Fri, 2 May 2003 13:00:24 -0400 Received: from lindsey.linux-systeme.com ([80.190.48.67]:34312 "EHLO mx00.linux-systeme.com") by vger.kernel.org with ESMTP id S263011AbTEBRAU (ORCPT ); Fri, 2 May 2003 13:00:20 -0400 From: Marc-Christian Petersen Organization: Working Overloaded Linux Kernel To: Matthias Andree , linux-kernel@vger.kernel.org Subject: Re: [Announcement] "Exec Shield", new Linux security feature Date: Fri, 2 May 2003 19:12:04 +0200 User-Agent: KMail/1.5.1 References: <20030502170528.GC29245@merlin.emma.line.org> In-Reply-To: <20030502170528.GC29245@merlin.emma.line.org> MIME-Version: 1.0 Content-Disposition: inline Message-Id: <200305021911.06972.m.c.p@wolk-project.de> Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 699 Lines: 19 On Friday 02 May 2003 19:05, Matthias Andree wrote: Hi Matthias, > Am I the only one under the impression that this looks as though this > had waited for OpenBSD 3.3 to say "Blbrrrrrrrrp! we're first to have > stack protection in the kernel and don't need to hack gcc." (Their W^X > isn't enabled on the i386 architecture, but is due (on i386) in 3.4.) hehehe ;) Well, they cannot say this even w/o exec shield b/c www.grsecurity.net. :) ciao, Marc - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/