if I read between the lines of this @grsecurity post… PaX doesn’t have userland stack proving and thus isn’t immune, despite claim @ start?
3
what probing do you mean? the kernel doesn't do anything like that, it enforces a heap-stack gap instead (in PaX since 2010AD).
1
how large a gap?
1
it's in the advisory, did you read it? ;)
1
i see, 64kb. i suppose it’s the best you can do from the kernel, but the problem is thinking that the problem should be solved in the kernel
2
Replying to @comex @grsecurity
yes but it's admin settable. the kernel cannot solve this, it's a codegen issue fundamentallly, no different from NX/ASLR/etc.

Jun 21, 2017 · 9:02 PM UTC

1