Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 9 Jul 2001 00:36:22 -0400
From:      "alexus" <ml@db.nexgen.com>
To:        "solwar" <solwar@email.si>
Cc:        <freebsd-security@FreeBSD.ORG>
Subject:   Re: non-exec stack
Message-ID:  <001901c10830$b51e7890$0100a8c0@alexus>
References:  <20010709030412.I3212-100000@SOLos.tw>

next in thread | previous in thread | raw e-mail | index | archive | help
did you find anything like that for fbsd?

i used to use that patch for my linux box;)

----- Original Message -----
From: "solwar" <solwar@email.si>
To: "alexus" <ml@db.nexgen.com>
Cc: <freebsd-security@FreeBSD.ORG>
Sent: Sunday, July 08, 2001 9:07 PM
Subject: Re: non-exec stack


> Most buffer overflow exploits are based on overwriting a function's return
> address on the stack to point to some arbitrary code, which is also put
> onto the stack.  If the stack area is non-executable, buffer overflow
> vulnerabilities become harder to exploit.
>
>
> On Sun, 8 Jul 2001, alexus wrote:
>
> > what do you mean by non-exec?
> >
> > ----- Original Message -----
> > From: "solwar" <solwar@email.si>
> > To: <freebsd-security@FreeBSD.ORG>
> > Sent: Sunday, July 08, 2001 5:03 PM
> > Subject: non-exec stack
> >
> >
> > > Hello,
> > > Is there is any non-exec stack kernel patch available for FreeBSD?
> > > (like linux's openwall patch from solar designer, www.openwall.com)
> > > tnx
> > >
> > >
> > >
> > > To Unsubscribe: send mail to majordomo@FreeBSD.org
> > > with "unsubscribe freebsd-security" in the body of the message
> > >
> >
> >
>
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
>


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?001901c10830$b51e7890$0100a8c0>