Language Selection

English French German Italian Portuguese Spanish

Securing Slackware

Filed under
Linux
Using the exec-shield Kernel Patch on Slackware 10.1

by Kurt Fitzner

The Holy Grail of most any hacker trying to get access to a system is the remote buffer overflow attack. Well, actually, it's finding a Windows PC not protected by a firewall, but the remote buffer overflow attack is a (somewhat) close second. This article will discus one way to help protect against this type of attack on a Slackware Linux system with the installation of a special system called exec-shield.

This installation will occur in two phases. The first phase is installing the exec-shield kernel patch, the second is replacing some of Slackware's packages with ones that are compiled to work together with exec-shield.

What is a Buffer Overflow Attack?

Before we explain how to protect against a buffer overflow attack, it is useful to examine what exactly this attack is and what the ramifications are for an unprotected system.

The best way to secure against a buffer overflow attack is to run software that isn't vulnerable to such attacks.

In order for a malicious attacker to get your system to do what the attacker wants it to do by using a buffer overflow to rewrite a return address, the attacker has to know the exact address in memory on your system of a useful function.

Full Article.

More in Tux Machines

Eight great Linux gifts for the holiday season

Do you want to give your techie friend a very Linux holiday season? Sure you do! Here are some suggestion to brighten your favorite Tux fan's day. Read more Also: More Random Gift Ideas For Linux Enthusiasts & Others Into Tech Which open source gift is at the top of your holiday wish list?

Ubuntu-Based ExTiX OS Updated for Intel Compute Sticks with Improved Installer

GNU/Linux developer Arne Exton announced this past weekend the release of an updated build of his Ubuntu-based ExTiX Linux distribution for Intel Compute Stick devices. Last month, we reported on the initial availability of a port of the ExTiX operating system for Intel Compute Sticks, boasting the lightweight and modern LXQt 0.10.0 desktop environment and powered by the latest Linux 4.8 kernel, tweaked by Arne Exton for Intel Atom processors. And now, ExTiX Build 161203 is out as a drop-in replacement for Build 161119, bringing a much-improved Ubiquity graphics installer that should no longer crash, as several users who attempted to install the Ubuntu-based GNU/Linux distro on their Intel Compute Stick devices reported. Read more Also: Debian-Based SparkyLinux 4.5 Brings Support for exFAT Filesystems, systemd 232 4MLinux 20.1 Linux Distro Released with Kernel 4.4.34 LTS to Restore PAE Support

Today in Techrights

Canonical Releases Snapcraft 2.23 Snap Creator for Ubuntu 16.04 LTS and 16.10

Canonical's Snappy development team have released a new maintenance version of the Snapcraft 2.x tool that lets applications developers package their apps as Snap packages for Ubuntu and other GNU/Linux distributions that support Snaps. Read more