Re: Non-Executable Stack Patch

Alan Cox (alan@lxorguk.ukuu.org.uk)
Wed, 4 Jun 1997 08:12:51 +0100 (BST)


> If you have been following the thread, you should have noted the reason
> why the stack is executable. The 'C' runtime libraries use trampolines
> to supply otherwise 'local' variables to functions called. This allows

And if you'd been following the thread you'd know this wasnt an issue
any more, and the stack stuff is FAR smarter than that now. Yes you can
still write exploits for some bugs - but its damn site harder.

The biggest problem we have left securitywise is probably /tmp file anyway
especially from GNU tools