Stopping buffer-overflow security exploits using page protection

From: Bruce Perens (bruce@perens.com)
Date: Sat Jul 29 2000 - 00:00:14 EST


Hi,

Please see http://technocrat.net/964824712/ . Is there any good
reason that we can not run Linux executables with the execute permission
turned off, by default, on all stack and data pages? Wouldn't this stop
buffer-overflow security exploits that try to inject executable code onto
the stack or into function tables? i386 won't support it, but other
architectures do.

        Thanks

        Bruce Perens

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Mon Jul 31 2000 - 21:00:29 EST