Re: security patch

From: Hagen Paul Pfeifer
Date: Thu Sep 22 2005 - 15:47:56 EST


* breno@xxxxxxxxxxxxxxxx | 2005-09-22 19:44:33 [-0000]:

>I'm doing a new feature for linux kernel 2.6 to protect against all kinds of buffer
>overflow. It works with new sys_control() system call controling if a process can or can't
>call a system call ie. sys_execve();

[...]

>Questions .. suggestions.

Think about userspace loaders! E.g. John Reiser's UPX or technics used in
self[0]. What about "protect against all kinds of buffer overflow", at
least the aplication can still be crash.

>Breno at kalangolinux.org

HGN

[0] http://www.phrack.org/show.php?p=63&a=11
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/