From owner-freebsd-questions Wed Jun 9 13:39:42 1999 Delivered-To: freebsd-questions@freebsd.org Received: from NetMint.COM (NetMint.COM [216.22.213.224]) by hub.freebsd.org (Postfix) with ESMTP id 4FB6F15422 for ; Wed, 9 Jun 1999 13:39:40 -0700 (PDT) (envelope-from andriss@argate.com) Received: from localhost (andriss@localhost) by NetMint.COM (8.9.3/8.9.3) with ESMTP id QAA24265 for ; Wed, 9 Jun 1999 16:39:42 -0400 (EDT) Date: Wed, 9 Jun 1999 16:39:41 -0400 (EDT) From: Andriss X-Sender: andriss@NetMint.COM To: freebsd-questions@freebsd.org Subject: no stack execution Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Hello, I was looking through the archives and found a few messages about a custom kernel hack that can supposedly stop certain types of buffer overflows. It looks like there is a patch for linux, by Solar Designer, but I could not find such patch for FreeBSD. (I am running FreeBSD 2.2.8) I also looked through the FreeBSD hardening project, but could not find information on stack execution. Does anyone know if such patch exists for FreeBSD, and if there are websites that discuss this issue? All comments will be appreciated. Thanks, Andriss To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message