Securing Files and Verifying File Integrity in Oracle® Solaris 11.2

Exit Print View

Updated: July 2014
 
 

How to Disable Programs From Using Executable Stacks

For a description of the security risks of 32-bit executable stacks, see Protecting Executable Files From Compromising Security.

Before You Begin

You must assume the root role. For more information, see Using Your Assigned Administrative Rights in Securing Users and Processes in Oracle Solaris 11.2 .

  1. Edit the /etc/system file, and add the following lines:
    # pfedit /etc/system
    ...
    set noexec_user_stack=1
    set noexec_user_stack_log=1
  2. Reboot the system.
    # reboot
Example 1-7  Disabling the Logging of Executable Stack Messages

In this example, the administrator disables logging of executable stack messages, then reboots the system.

# cat /etc/system
set noexec_user_stack=1
set noexec_user_stack_log=0
# reboot

See also