RE: noexec_user_stack linux parameter
Date: Fri, 9 Oct 2009 15:42:53 -0500
>In short, this parameter is makes the stack non-executable to help
>prevent buffer overflow exploits.
>I can find a lot of info about setting this on Solaris, but very little
>about doing so on Linux.
>Has anyone here used this parameter on Linux?
I think the closest thing to the parameter that you are looking above on Linux is "kernel.exec-shield"
Its enabled by default and should therefore not be a problem
WilliamReceived on Fri Oct 09 2009 - 15:42:53 CDT