RE: noexec_user_stack linux parameter

From: William Muriithi <william.muriithi_at_epicadvertising.com>
Date: Fri, 9 Oct 2009 15:42:53 -0500
Message-ID: <FCF31DDE39A1D5458503CB885101CB830A1B9554_at_AUSP01VMBX10.collaborationhost.net>


>In short, this parameter is makes the stack non-executable to help
>prevent buffer overflow exploits.

>I can find a lot of info about setting this on Solaris, but very little
>about doing so on Linux.

>Has anyone here used this parameter on Linux?

I think the closest thing to the parameter that you are looking above on Linux is "kernel.exec-shield"

Its enabled by default and should therefore not be a problem

William

--
http://www.freelists.org/webpage/oracle-l
Received on Fri Oct 09 2009 - 15:42:53 CDT

Original text of this message