Re: Unexecutable Stack / Buffer Overflow Exploits...

From: Dan Hollis (goemon@sasami.anime.net)
Date: Wed Jan 05 2000 - 14:30:12 EST


On Wed, 5 Jan 2000, Anton Ivanov wrote:
> I think that maybe the quickest thing to implement will be the random
> stack start suggested by tytso. I already reposted it to
> debian-security.

Is there any reason this can't be implemented immediately? What are the
possible problems of mapping libs and stack to address containing 0x00?

-Dan

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Fri Jan 07 2000 - 21:00:04 EST