[4270] in bugtraq

home help back first fref pref prev next nref lref last post

Re: 2nd Linux kernel patch to remove stack exec

daemon@ATHENA.MIT.EDU (Systemkennung Linux)
Sun Apr 13 19:56:31 1997

Date: 	Mon, 14 Apr 1997 00:26:59 +0200
Reply-To: Systemkennung Linux <linux@MAILHOST.UNI-KOBLENZ.DE>
From: Systemkennung Linux <linux@MAILHOST.UNI-KOBLENZ.DE>
X-To:         solar@sun1.ideal.ru
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <199704132043.RAA06710@sun1.ideal.ru> from "solar@sun1.ideal.ru"
              at Apr 13, 97 05:43:04 pm

Hi,

> It's not really a problem -- everything should run just fine with my patch.
> However, the patch will not prevent buffer overflow exploits for those
> programs that use trampolines.
>
> This means that as long as libc5 is being used, most (if not all) privileged
> processes will have stack execution permission disabled. :)
>
> As for glibc, maybe it is time to change it not to use trampolines?

A patch which does this should now be in the glibc 2.1 development source.

> > Admited trampolines are a stupid idea because their performance sucks
> > on many architectures.
>
> AFAIK, they will cause some overhead for maintaining L1 code and data caches
> coherency, since the stack frame is usually in the data cache -- resulting in
> bad performance.

We're talking about some hundred cycles or more ...

  Ralf

home help back first fref pref prev next nref lref last post