/srv/irclogs.ubuntu.com/2011/07/02/#ubuntu-kernel.txt

erle-natty does not seem to have execshield in 32 bit edition10:10
erle-does it have a different type of protection?10:11
erle-(i have to get rid of it)10:11
ohsixwhy do you have to get rid of it?10:12
erle-security experiments10:13
ohsixwell you can change the page attributes if you are writing the software; or disable the flag you want in the elf header if you aren't10:14
erle-this means not every program is protected now by default?10:15
ohsixyou can boot with noexec=off too10:16
erle-ok, thanks10:16
erle-its a VM10:16
erle-i will do that10:16
ohsixby default only specialized applications mark pages executable, for code they generate10:16
erle-yes, but with third party software you never know, right?10:17
ohsixwell sort of, you can look at it's elf header, and you could always use strace to see if it's making mprotect calls10:18
erle-the code i want to execute is placed in an array on stack, and it tells me "illegal instruction"10:19
ohsixi think theres a place in /proc/$pid/ that has the page flags too; so you can just grep it10:19
erle-but i am pretty sure that i have done it rightly10:19
erle-jumping to a random line in code section works perfectly well10:19
ohsixyour stack will be marked noexec by default, you need to tell the linker not to, or edit the header with something10:20
erle-i will disable noexec completely on that VM10:20
ohsixmost exploits love the ease at which code can be run from the stack :] that's why it's a mitigation10:20
erle-yeah, i totally understand that10:25
erle-i would not disable that on my sacred host system :)10:25
=== yofel_ is now known as yofel
=== Quintasan_ is now known as Quintasan

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!