RE: noexec_user_stack linux parameter
From: William Muriithi <william.muriithi_at_epicadvertising.com>
Date: Fri, 9 Oct 2009 15:42:53 -0500
Message-ID: <FCF31DDE39A1D5458503CB885101CB830A1B9554_at_AUSP01VMBX10.collaborationhost.net>
Date: Fri, 9 Oct 2009 15:42:53 -0500
Message-ID: <FCF31DDE39A1D5458503CB885101CB830A1B9554_at_AUSP01VMBX10.collaborationhost.net>
>In short, this parameter is makes the stack non-executable to help
>prevent buffer overflow exploits.
>I can find a lot of info about setting this on Solaris, but very little
>about doing so on Linux.
>Has anyone here used this parameter on Linux?
I think the closest thing to the parameter that you are looking above on Linux is "kernel.exec-shield"
Its enabled by default and should therefore not be a problem
William
-- http://www.freelists.org/webpage/oracle-lReceived on Fri Oct 09 2009 - 15:42:53 CDT