Date: Mon, 26 Aug 1996 00:05:52 -0600 From: Warner Losh <imp@village.org> To: Gene Stark <gene@starkhome.cs.sunysb.edu> Cc: security@freebsd.org Subject: Re: Vulnerability in the Xt library (fwd) Message-ID: <199608260605.AAA07212@rover.village.org> In-Reply-To: Your message of Mon, 26 Aug 1996 01:59:31 EDT
index | next in thread | raw e-mail
: However, this new system call could test to make sure that it is : being executed from the text segment, which is read-only, and refuse : to perform if not. Well, couldn't the code that was inserted onto the stack copy itself somewhere handy, make that a read only text segment, and make these calls? Why is the stack segment executable in the first place? Or does Intel require this? Warnerhome | help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199608260605.AAA07212>
