![](https://seccdn.libravatar.org/avatar/861b5545c111d2257fa12e533e723110.jpg?s=120&d=mm&r=g)
20 Jan
2003
20 Jan
'03
02:24
The 03.01.19 at 07:52, zentara wrote:
Off the top of my head, I think the grsecurity kernel patch has an option to allow you to make the stack non-executable. BUT it breaks alot of programs, notably X. The grsecurity system does allow you to specifically exempt certain programs though.
Now that makes me wonder... why would the stack need to be executable? It should only be needed for local data and return address for subroutines, and things lke that, no? Or does somebody uses hacks like selfmodifying code? -- Cheers, Carlos Robinson