Date: Mon, 26 Aug 1996 00:05:52 -0600 From: Warner Losh <imp@village.org> To: Gene Stark <gene@starkhome.cs.sunysb.edu> Cc: security@freebsd.org Subject: Re: Vulnerability in the Xt library (fwd) Message-ID: <199608260605.AAA07212@rover.village.org> In-Reply-To: Your message of Mon, 26 Aug 1996 01:59:31 EDT
next in thread | raw e-mail | index | archive | help
: However, this new system call could test to make sure that it is : being executed from the text segment, which is read-only, and refuse : to perform if not. Well, couldn't the code that was inserted onto the stack copy itself somewhere handy, make that a read only text segment, and make these calls? Why is the stack segment executable in the first place? Or does Intel require this? Warner
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199608260605.AAA07212>