Alan spoke with me about this problem last week since I still maintain
(though not very actively) the libc5 dynamic linker. I suggested he
take his idea to the linux-kernel list. Perhaps the idea wan't
expressed completely or a crucial part got lost in the noise. Anyway,
that crucial part is for the kernel to only use MAP_DENYWRITE when
MAP_EXECUTABLE is used AND the underlying file has the executable bit
set. Since binaries and shared libraries are the only files which
should have executable bits set, the type of denial-of-service attack
decscribed above should not be able to happen.
David
-- David Engel dlengel@home.com- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.altern.org/andrebalsa/doc/lkml-faq.html