On amd64 and arm64, #HardenedBSD ignores the executable stack flag: https://www.openwall.com/lists/oss-security/2018/10/22/3 …
We also follow the PaX model of W^X (PaX NOEXEC (PaX PAGEEXEC and PaX MPROTECT)).
Nice to see that we're more strict than #Linux. :)
-
-
Replying to @lattera @augustob333
Are you maintaining own fork of grsecurity or how this works (https://grsecurity.net/passing_the_baton.php …)??
1 reply 0 retweets 0 likes -
Replying to @antti_antinoja @augustob333
We in HardenedBSD are implementing a clean room reimplementation of the grsecurity patchset based on publicly available documentation.
3 replies 0 retweets 2 likes
* small subset of the last public release of the grsecurity patchset ;)
3:20 PM - 23 Oct 2018
0 replies
0 retweets
1 like
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.