Re: Fwd: LSM patch for Linux-2.4.20-8

From: Rogelio Serrano (rogelio.serrano@private)
Date: Thu Jan 20 2005 - 18:30:48 PST


On Thu, 20 Jan 2005 18:21:09 -0800, Seth Arnold <sarnold@private> wrote:
> On Fri, Jan 21, 2005 at 09:08:17AM +0800, Rogelio Serrano wrote:
> > Is there a way to have these kind of protection without hiding bugs.
> > Maybe the audit framework can help?
> 
> "Hiding bugs" is _not_ what a non-executable stack or data segment does;
> if a program relies on executable stack or data segment for executing,
> the process will die a miserable death. And loudly, at that.
> 
> If the program allows this behaviour accidently (say, bounds checking
> error such as the type that StackGuard can protect against) then the
> flaw will in fact be much _easier_ to spot with such a tool. (StackGuard
> has found a _lot_ of bugs in software that went unnoticed because the
> consequences weren't very dire, including a hilarious off-by-one array
> access in glibc's test suite.)
> 
> No, in my experience, tools like stackguard, Solar's non-executable
> stack, and similar, do a great job _finding_ buggy code that would
> otherwise survive in the wild unnoticed for years...
> 

Consider me a convert. That does make sense. 

-- 
Blood is thicker than water... and much tastier
                                           John Davidorff Pell



This archive was generated by hypermail 2.1.3 : Thu Jan 20 2005 - 18:31:17 PST