> non executable stack give, as it was said before, a false sence of security;
I agree. Although it makes the life on someone who wants to get in a bit
> also, the majority of recent exploit work on non exec stack as it is, at least,
> as easy to write an exploit for non executable as for executable stack.
Is it ?? Lots of exploits abuse the fact that you can push some code on
the stack, and that get's executed.. If you can't make that move, it makes
the job a bit harder..
> So it will not even work on short term.
Restricting the power of root I think is some nice way to make a
start.. The main goals is still making userland apps secure.
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to firstname.lastname@example.org
Please read the FAQ at http://www.tux.org/lkml/
This archive was generated by hypermail 2b29 : Mon May 15 2000 - 21:00:11 EST