RE: noexec_user_stack linux parameter

  • From: William Muriithi <william.muriithi@xxxxxxxxxxxxxxxxxxx>
  • To: "jkstill@xxxxxxxxx" <jkstill@xxxxxxxxx>, Oracle-L Freelists <oracle-l@xxxxxxxxxxxxx>
  • Date: Fri, 9 Oct 2009 15:42:53 -0500



>In short, this parameter is makes the stack non-executable to help
>prevent buffer overflow exploits.

>I can find a lot of info about setting this on Solaris, but very little
>about doing so on Linux.

>Has anyone here used this parameter on Linux?


I think the closest thing to the parameter that you are looking above on Linux 
is "kernel.exec-shield"

Its enabled by default and should therefore not be a problem

William
--
//www.freelists.org/webpage/oracle-l


Other related posts: