Questions tagged [aslr]

Questions related to ASLR (Address Space Layout Randomization), a technique to randomize the address space of executable instruction as well as the memory address allocated to stack of a program, should use this tag.

Address space layout randomization (ASLR) is a computer security technique involved in preventing exploitation of memory corruption vulnerabilities.

4 questions
5
votes
0 answers

How does linux decide the load address and entry point when execve an ELF?

When linux execve() an ELF, it will mmap that ELF into the process's memory space and start to run code from the entry point. But how does the kernel decide the load address and entry point of the ELF? If ASLR is disabled, it looks up the .p_vaddr…
炸鱼薯条德里克
  • 1,337
  • 1
  • 12
  • 31
4
votes
2 answers

Memory Randomization in Linux

I created a simple C program and every time I load it in GDB, I see the same memory addresses allocated to the instructions of the program. For example, a function what() always loads at memory location 0x000055555555472d. In fact the stack is…
7_R3X
  • 1,134
  • 2
  • 14
  • 28
0
votes
1 answer

How do I know if a shared object (.so) has ASLR enabled?

And what happens if the base adress the .so wants is not free, will loading the so fails, or will the dynamic loader perform relocation ?
hehehe
  • 1
0
votes
1 answer

ASLR on i686-pae vs amd64 kernels running 32bit processes

Is ASLR more, same or less secure for a process running on an i686-pae kernel or for a 32bit process running on an amd64 kernel?