Re: Linux Buffer Overflow Security Exploits

Tuomas Heino (iheino@cc.hut.fi)
Thu, 4 Mar 1999 18:55:44 +0200 (EET)


On Wed, 3 Mar 1999, Alan Cox wrote:

> > I suppose my original question could be boiled down into:
> >
> > Does a Linux (and/or other Unix) process inhabit a single read/write/execute
> > memory segment?
>
> No. The executable image is read only or copy-on-write. The stack however has
> to readable (obviously) and x86 has a problem with page level permissions
> for execute only (it hasnt got them)
>
> Forget about segments, intel has been trying to de-invent them since the 386.

And how do you use more than 4 gigabytes of RAM on these boring Intel
boxes _without_ segmentation? ;)
[... and don't say "ram drives" - unless you have a new meaning for that ;)]

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/