lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 14 Aug 2003 16:09:16 -0400 From: "Matt D. Harris" <vesper@...raved.org> To: undisclosed-recipients:; Subject: Re: Buffer overflow prevention Theo de Raadt wrote: > I believe the best protection (at this time) is to combine ProPolice with > a W^X technology. Solaris 2.6 and above also support a kernel variable which can be set via /etc/system called "noexec_user_stack", which can make the stack for userland processes non-executable by default. Note that this behavior is the default for 64-bit binaries in Solaris 7, 8, and 9, and this kernel variable forces the behavior for 32-bit binaries. I run all sorts of odd software and have never had an issue with having this always turned on for all of my systems.
Powered by blists - more mailing lists