| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
| |
(Portage version: 2.0.51.22-r3)
(Unsigned Manifest commit)
|
|
|
|
| |
(Portage version: 2.0.51.22-r3)
|
|
|
|
|
| |
(Portage version: 2.0.53_rc5)
(Signed Manifest commit)
|
|
|
|
|
| |
(Portage version: 2.0.53_rc5)
(Unsigned Manifest commit)
|
|
|
|
| |
(Portage version: 2.0.53_rc5)
|
|
|
|
|
| |
(Portage version: 2.0.51.22-r2)
(Unsigned Manifest commit)
|
|
|
|
| |
(Portage version: 2.0.51.22-r2)
|
|
|
|
|
| |
(Portage version: 2.0.51.19) (Manifest recommit)
(Portage version: 2.0.51.19)
|
|
|
|
| |
(Portage version: 2.0.51.19)
|
|
|
|
| |
(Signed Manifest commit)
|
|
|
|
| |
(Unsigned Manifest commit)
|
| |
|
|
|
|
|
|
|
| |
unneeded program header into PT_PAX_FLAGS
(Portage version: 2.0.51.21) (Manifest recommit)
(Portage version: 2.0.51.21)
|
|
|
|
|
|
| |
unneeded program header into PT_PAX_FLAGS
(Portage version: 2.0.51.21)
|
|
|
|
|
| |
(Portage version: 2.0.51.19) (Manifest recommit)
(Portage version: 2.0.51.19)
|
|
|
|
| |
(Portage version: 2.0.51.19)
|
|
|
|
|
| |
(Portage version: 2.0.51.19) (Manifest recommit)
(Portage version: 2.0.51.19)
|
|
|
|
| |
(Portage version: 2.0.51.19)
|
|
|
|
| |
(Manifest recommit)
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
is an intrusion prevention system that provides the best protection
mechanisms against memory corruption bugs. Some applications are not
compatible with certain features (due to design or bad engineering)
and therefore they have to be exempted from certain enforcements. It
is also possible to use PaX in soft mode where none of the protection
mechanisms are active by default - here paxctl can be used to turn
them on for selected programs (e.g., network daemons, programs that
process network data such as mail clients, web browsers, etc).
PaX and paxctl work on ELF executables, both of the standard ET_EXEC
and the newer ET_DYN kind (older PaX releases referred to the latter
as ET_DYN executables, these days they are called Position Independent
Executables or PIEs for short). (Manifest recommit)
|
|
is an intrusion prevention system that provides the best protection
mechanisms against memory corruption bugs. Some applications are not
compatible with certain features (due to design or bad engineering)
and therefore they have to be exempted from certain enforcements. It
is also possible to use PaX in soft mode where none of the protection
mechanisms are active by default - here paxctl can be used to turn
them on for selected programs (e.g., network daemons, programs that
process network data such as mail clients, web browsers, etc).
PaX and paxctl work on ELF executables, both of the standard ET_EXEC
and the newer ET_DYN kind (older PaX releases referred to the latter
as ET_DYN executables, these days they are called Position Independent
Executables or PIEs for short).
|