On Wed, 3 Jan 2001, Alexander Viro wrote: > > This preliminary, small patch prevents execution of system calls which > > were executed from a writable segment. It was tested and seems to work, > > without breaking anything. It also reports of such calls by using printk. > > Get real. Attacker can set whatever registers he needs and jump to one > of the many instances of int 0x80 in libc. There goes your protection. But unlike syscalls, offsets inside libc do change. Aren't they? Programs don't have to use libc, they can be compiled as static. -- Dan Aloni [EMAIL PROTECTED] - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
- [RFC] prevention of syscalls from writable segments, breaki... Dan Aloni
- Re: [RFC] prevention of syscalls from writable segment... Brian Gerst
- Re: [RFC] prevention of syscalls from writable segment... Alexander Viro
- Re: [RFC] prevention of syscalls from writable seg... Dan Aloni
- Re: [RFC] prevention of syscalls from writable... Alexander Viro
- Re: [RFC] prevention of syscalls from writable seg... Steven Walter
- Re: [RFC] prevention of syscalls from writable seg... Dan Hollis
- Re: [RFC] prevention of syscalls from writable... Doug McNaught
- Re: [RFC] prevention of syscalls from writable... Alexander Viro
- Re: [RFC] prevention of syscalls from writ... Mark Zealey
- Re: [RFC] prevention of syscalls from... Alexander Viro
- Re: [RFC] prevention of syscalls ... Mark Zealey
- Re: [RFC] prevention of syscalls from writ... Dan Aloni
- Re: [RFC] prevention of syscalls from... Alexander Viro