Date: Mon, 9 Jul 2001 00:36:22 -0400 From: "alexus" <ml@db.nexgen.com> To: "solwar" <solwar@email.si> Cc: <freebsd-security@FreeBSD.ORG> Subject: Re: non-exec stack Message-ID: <001901c10830$b51e7890$0100a8c0@alexus> References: <20010709030412.I3212-100000@SOLos.tw>
next in thread | previous in thread | raw e-mail | index | archive | help
did you find anything like that for fbsd? i used to use that patch for my linux box;) ----- Original Message ----- From: "solwar" <solwar@email.si> To: "alexus" <ml@db.nexgen.com> Cc: <freebsd-security@FreeBSD.ORG> Sent: Sunday, July 08, 2001 9:07 PM Subject: Re: non-exec stack > Most buffer overflow exploits are based on overwriting a function's return > address on the stack to point to some arbitrary code, which is also put > onto the stack. If the stack area is non-executable, buffer overflow > vulnerabilities become harder to exploit. > > > On Sun, 8 Jul 2001, alexus wrote: > > > what do you mean by non-exec? > > > > ----- Original Message ----- > > From: "solwar" <solwar@email.si> > > To: <freebsd-security@FreeBSD.ORG> > > Sent: Sunday, July 08, 2001 5:03 PM > > Subject: non-exec stack > > > > > > > Hello, > > > Is there is any non-exec stack kernel patch available for FreeBSD? > > > (like linux's openwall patch from solar designer, www.openwall.com) > > > tnx > > > > > > > > > > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > > > with "unsubscribe freebsd-security" in the body of the message > > > > > > > > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-security" in the body of the message > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?001901c10830$b51e7890$0100a8c0>