Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 26 Aug 1996 00:05:52 -0600
From:      Warner Losh <imp@village.org>
To:        Gene Stark <gene@starkhome.cs.sunysb.edu>
Cc:        security@freebsd.org
Subject:   Re: Vulnerability in the Xt library (fwd) 
Message-ID:  <199608260605.AAA07212@rover.village.org>
In-Reply-To: Your message of Mon, 26 Aug 1996 01:59:31 EDT

index | next in thread | raw e-mail

: However, this new system call could test to make sure that it is
: being executed from the text segment, which is read-only, and refuse
: to perform if not.

Well, couldn't the code that was inserted onto the stack copy itself
somewhere handy, make that a read only text segment, and make these
calls?

Why is the stack segment executable in the first place?  Or does Intel
require this?

Warner


home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199608260605.AAA07212>