Hi,
Please see http://technocrat.net/964824712/ . Is there any good
reason that we can not run Linux executables with the execute permission
turned off, by default, on all stack and data pages? Wouldn't this stop
buffer-overflow security exploits that try to inject executable code onto
the stack or into function tables? i386 won't support it, but other
architectures do.
Thanks
Bruce Perens
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/
This archive was generated by hypermail 2b29 : Mon Jul 31 2000 - 21:00:29 EST