Re: Linux Buffer Overflow Security Exploits

Alan Cox (alan@lxorguk.ukuu.org.uk)
Wed, 3 Mar 1999 22:24:44 +0000 (GMT)


> I suppose my original question could be boiled down into:
>
> Does a Linux (and/or other Unix) process inhabit a single read/write/execute
> memory segment?

No. The executable image is read only or copy-on-write. The stack however has
to readable (obviously) and x86 has a problem with page level permissions
for execute only (it hasnt got them)

Forget about segments, intel has been trying to de-invent them since the 386.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/