Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 11 Jul 2001 22:35:50 +0200
From:      Borja Marcos <borjamar@sarenet.es>
To:        freebsd-security@freebsd.org
Subject:   Re: non-exec stack
Message-ID:  <01071122332004.02234@nenuial.arnor.es>
In-Reply-To: <20010711121731.A87389@xor.obsecurity.org>
References:  <001901c10830$b51e7890$0100a8c0@alexus> <20010711145325.L66856-100000@scribble.fsn.hu> <20010711121731.A87389@xor.obsecurity.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wednesday 11 July 2001 21:17, you wrote:
> That's a different thing (it doesn't make the stack non-executable, it
> patches gcc to generate code which tries to catch and prevent
> stack-smashing buffer overflows).  I don't know of anyone who has
> written a non-exec stack patch for FreeBSD.  It would certainly be
> welcome.

	I wonder... how is it implemented? Perhaps checking that the page is not 
a stack page whenever the process enters a system call? Checking the same 
at context switches?




	Borja.

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?01071122332004.02234>