mirror of the now-defunct rocklinux.org
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

53 lines
2.2 KiB

  1. [COPY] --- ROCK-COPYRIGHT-NOTE-BEGIN ---
  2. [COPY]
  3. [COPY] This copyright note is auto-generated by ./scripts/Create-CopyPatch.
  4. [COPY] Please add additional copyright information _after_ the line containing
  5. [COPY] the ROCK-COPYRIGHT-NOTE-END tag. Otherwise it might get removed by
  6. [COPY] the ./scripts/Create-CopyPatch script. Do not edit this copyright text!
  7. [COPY]
  8. [COPY] ROCK Linux: rock-src/package/base/libsafe/libsafe.desc
  9. [COPY] ROCK Linux is Copyright (C) 1998 - 2004 Clifford Wolf
  10. [COPY]
  11. [COPY] This program is free software; you can redistribute it and/or modify
  12. [COPY] it under the terms of the GNU General Public License as published by
  13. [COPY] the Free Software Foundation; either version 2 of the License, or
  14. [COPY] (at your option) any later version. A copy of the GNU General Public
  15. [COPY] License can be found at Documentation/COPYING.
  16. [COPY]
  17. [COPY] Many people helped and are helping developing ROCK Linux. Please
  18. [COPY] have a look at http://www.rocklinux.org/ and the Documentation/TEAM
  19. [COPY] file for details.
  20. [COPY]
  21. [COPY] --- ROCK-COPYRIGHT-NOTE-END ---
  22. [I] detection and protection against stack smashing attacks
  23. [T] The libsafe library protects a process against the exploitation of
  24. [T] buffer overflow vulnerabilities in process stacks. Libsafe works with
  25. [T] any existing pre-compiled executable and can be used transparently,
  26. [T] even on a system-wide basis. The method intercepts all calls to
  27. [T] library functions that are known to be vulnerable. A substitute
  28. [T] version of the corresponding function implements the original
  29. [T] functionality, but in a manner that ensures that any buffer overflows
  30. [T] are contained within the current stack frame. Libsafe has been shown
  31. [T] to detect several known attacks and can potentially prevent yet
  32. [T] unknown attacks. Experiments indicate that the performance overhead
  33. [T] of libsafe is negligible.
  34. [U] http://www.bell-labs.com/org/11356/libsafe.html
  35. [A] Arash Baratloo, Timothy Tsai, and Navjot Singh
  36. [M] Clifford Wolf <clifford@clifford.at>
  37. [C] base/library
  38. [L] GPL
  39. [S] Stable
  40. [V] 2.0-16
  41. [P] X -?---5---9 106.000
  42. [CV-URL] http://www.research.avayalabs.com/project/libsafe/
  43. [D] 3690639892 libsafe-2.0-16.tgz http://www.research.avayalabs.com/project/libsafe/src/