aboutsummaryrefslogtreecommitdiffstats
path: root/security/libparanoia/pkg-descr
blob: 57dafafd8baa7f6dc30ce792fc80f59bc7763c87 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
This is a library, which contains a safe reincarnations
of strcpy/strcat/sprintf and some other functions,
which is known to be a source to 99% of stack smashing 
attacks since Morrison Worm. 

Basic idea is: these functions never return in case 
of modified stack frames. Instead, they kills current
process with SIG_SEGV, and, in case when program 
just ignores it - calls exit(2). In 'paranoidal'
point of view, termination of a process is a much 
less worth, than possible incorrect continuation.

This library can be used in two ways - you can just 
install it as a port/package, and then relink critical
applications (such as a network daemons) with 
-lparanoia -L/usr/local/lib, or you can override
standard functions in libc (using libparanoia/copy-to-libc 
shell script) - in this case you'll get any application,
which uses shared libc, automatically protected.

WWW: http://www.lexa.ru/snar/libparanoia/
-- 
Alexandre Snarskii <snar@paranoia.ru>.  Baltika-3 is better :)