Subject: Re: read {write,only} stack
To: Brett Lymn <blymn@baea.com.au>
From: Paul B Dokas <dokas@cs.umn.edu>
List: current-users
Date: 08/20/1997 12:18:28
On Wed, 20 Aug 1997, Brett Lymn wrote:
> According to Carl S Shapiro:
> >
> >Is there any way to prevent the stack from being executable?
>
> For the i386 architecture there was some linux hacks that would stop
> the stack being executable - dunno how portable they would be, if at
> all. You need to be careful about doing this though as the changes
> are more than just a kernel hack. IIRC gcc relies on an executable
> stack for some of it's trampoline code which means that some things
> could break with a non-executable stack. The up side is that it does
> provide a convenient method of preventing the fixed-buffer overrun type
> exploits that are currently fashionable in the cracker community.
I was wondering about this last night. Wouldn't it be enough to make
the stack non-executable for setuid binaries only? That way, all non-setuid
program continue to work, but quite a few security holes are plugged.
Paul
--
Paul Dokas dokas@cs.umn.edu
======================================================================
Don Juan Matus: "an enigma wrapped in mystery wrapped in a tortilla."