COLLECTED BY
Organization:
Internet Archive These crawls are part of an effort to archive pages as they are created and archive the pages that they refer to. That way, as the pages that are referenced are changed or taken from the web, a link to the version that was live when the page was written will be preserved.
Then the Internet Archive hopes that references to these archived pages will be put in place of a link that would be otherwise be broken, or a companion link to allow people to see what was originally intended by a page's authors.
The goal is to
fix all broken links on the web. Crawls of supported "No More 404" sites.
This is a collection of web page captures from links added to, or changed on, Wikipedia pages. The idea is to bring a reliability to Wikipedia outlinks so that if the pages referenced by Wikipedia articles are changed, or go away, a reader can permanently find what was originally referred to.
This is part of the Internet Archive's attempt to
rid the web of broken links.
The Wayback Machine - https://web.archive.org/web/20151005085845/http://www.openwall.com/lists/oss-security/2015/03/13/1
[<prev][next>][<thread-prev][thread-next>][day][month][year][list] Date: Thu, 12 Mar 2015 20:31:42 -0700 From: Nick Kralevich <nnk@...gle.com> To: oss-security@...ts.openwall.com Cc: "CERT(R) Coordination Center" <cert@...t.org> Subject: Re: Vendor adoption of PIE INFO#934476 oss-security I wanted to provide a followup on this year-old thread. With the release of Android 5.0, Android has removed support for non-PIE binaries [1] [2]. Attempting to run a non-PIE binary will generate an error on Android. In this way, we ensure that all binaries take full advantage of Android's ASLR implementation. This is just one of the many security enhancements added in Android 5.*, and one that I hope other Linux distributions will pick up. [1] https://source.android.com/devices/tech/security/enhancements/enhancements50.html [2] https://android.googlesource.com/platform/bionic/+/76e289c026f11126fc88841b3019fd5bb419bb67 -- Nick On Sun, Feb 16, 2014 at 11:54 AM, Nick Kralevich <nnk@...gle.com> wrote: > On Android, third party applications have always been compiled with > -fPIC, ever since the initial release of Android. As mentioned earlier > in this thread, the performance impacts of PIC and PIE are similar. > > Starting in Android 4.1, all dynamically linked ARM [1] and x86 [2] > executables are compiled with PIE. Compiling with PIE on MIPS was > added in Android 4.3 [3]. Statically linked executables with PIE are > not supported today [4], although I'd love to see it in the future. > > I have yet to hear any complaint, on x86 or ARM, about any real world > performance impact of PIE on Android, even though the code has been > live and in user's hands for almost 2 years. > > [1] https://android.googlesource.com/platform/build/+/026a85b129e4540a4d8d40aace47aa0c69f609da > [2] https://android.googlesource.com/platform/build/+/d9d2e7a42c18a997ae47e4174713b5e2942044b5 > [3] https://android.googlesource.com/platform/build/+/f1e4df72651f38208f209f8c60ee18213a38d21d > [4] http://comments.gmane.org/gmane.comp.gnu.binutils/56324 -- Nick Kralevich | Android Security | nnk@...gle.com | 650.214.4037
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.


