Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 26 Aug 1996 00:05:52 -0600
From:      Warner Losh <imp@village.org>
To:        Gene Stark <gene@starkhome.cs.sunysb.edu>
Cc:        security@freebsd.org
Subject:   Re: Vulnerability in the Xt library (fwd) 
Message-ID:  <199608260605.AAA07212@rover.village.org>
In-Reply-To: Your message of Mon, 26 Aug 1996 01:59:31 EDT

next in thread | raw e-mail | index | archive | help
: However, this new system call could test to make sure that it is
: being executed from the text segment, which is read-only, and refuse
: to perform if not.

Well, couldn't the code that was inserted onto the stack copy itself
somewhere handy, make that a read only text segment, and make these
calls?

Why is the stack segment executable in the first place?  Or does Intel
require this?

Warner



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199608260605.AAA07212>