Date: Wed, 11 Jul 2001 22:35:50 +0200 From: Borja Marcos <borjamar@sarenet.es> To: freebsd-security@freebsd.org Subject: Re: non-exec stack Message-ID: <01071122332004.02234@nenuial.arnor.es> In-Reply-To: <20010711121731.A87389@xor.obsecurity.org> References: <001901c10830$b51e7890$0100a8c0@alexus> <20010711145325.L66856-100000@scribble.fsn.hu> <20010711121731.A87389@xor.obsecurity.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wednesday 11 July 2001 21:17, you wrote: > That's a different thing (it doesn't make the stack non-executable, it > patches gcc to generate code which tries to catch and prevent > stack-smashing buffer overflows). I don't know of anyone who has > written a non-exec stack patch for FreeBSD. It would certainly be > welcome. I wonder... how is it implemented? Perhaps checking that the page is not a stack page whenever the process enters a system call? Checking the same at context switches? Borja. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?01071122332004.02234>