Re: Buffer overflow prevention

From: Mariusz Woloszyn (emsiat_private)
Date: Mon Aug 18 2003 - 11:01:51 PDT

  • Next message: Stefan Esser: "Advisory 02/2003: emule/xmule/lmule vulnerabilities"

    On Mon, 18 Aug 2003 pageexecat_private wrote:
    
    > > Anyways, on an i386 you can do W^X somewhat.  Not as perfectly as you
    > > can on cpus that have a per-page X bit...
    >
    > You are wrong again, PaX provides perfect per-page non-executable pages
    > using segmentation (SEGMEXEC), there are no restrictions on the ordering
    > of data/code pages like in OpenBSD.
    >
    BTW: have anyone tried to talk wih Linus about implementing some PaX (or
    even GR) functionality in official Kernels?
    I know that the argument for not implementing Solar Designer's
    nonexecutable stack patch in official kernel was that it is easily
    bypassable, so what about PaX???
    
    I hate seeing GOT and other segments rwx nowdays (while it's marked as r-x
    it IS executable).
    
    -- 
    Mariusz Wołoszyn
    Internet Security Specialist, GTS - Internet Partners
    



    This archive was generated by hypermail 2b30 : Mon Aug 18 2003 - 13:22:00 PDT