RE: noexec_user_stack linux parameter

From: William Muriithi <>
Date: Fri, 9 Oct 2009 15:42:53 -0500
Message-ID: <>

>In short, this parameter is makes the stack non-executable to help
>prevent buffer overflow exploits.

>I can find a lot of info about setting this on Solaris, but very little
>about doing so on Linux.

>Has anyone here used this parameter on Linux?

I think the closest thing to the parameter that you are looking above on Linux is "kernel.exec-shield"

Its enabled by default and should therefore not be a problem


Received on Fri Oct 09 2009 - 15:42:53 CDT

Original text of this message