Re: Stopping buffer-overflow security exploits using page protection

From: Alan Cox (alan@lxorguk.ukuu.org.uk)
Date: Sat Jul 29 2000 - 09:55:27 EST


> Please see http://technocrat.net/964824712/ . Is there any good
> reason that we can not run Linux executables with the execute permission
> turned off, by default, on all stack and data pages? Wouldn't this stop

Yes: x86 doesnt support read without execute

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Mon Jul 31 2000 - 21:00:30 EST