I was wondering about that too, though perhaps a bit less ... emphatically. Did this new PaX thing replace the nonexecutable pages stuff somehow (don't laugh, I'm still very new to this and trying to get the concepts figured out)? Or did something get missed in 1.9.14?
I'm just trying grsec for the first time, and was wondering if there's some setting I need to enable somewhere to get the PAX stuff to work. Right now it doesn't seem to be enabled? Non-PAX features seem to be working, but paxtest 0.9.5 says:
- Code: Select all
---------------------------------------------------------------------------------
PaXtest - Copyright(c) 2003 by Peter Busser <peter@adamantix.org>
Released under the GNU Public Licence version 2 or later
It may take a while for the tests to complete
Test results:
PaXtest - Copyright(c) 2003 by Peter Busser <peter@adamantix.org>
Released under the GNU Public Licence version 2 or later
Executable anonymous mapping : Vulnerable
Executable bss : Vulnerable
Executable data : Vulnerable
Executable heap : Vulnerable
Executable stack : Vulnerable
Executable anonymous mapping (mprotect) : Vulnerable
Executable bss (mprotect) : Vulnerable
Executable data (mprotect) : Vulnerable
Executable heap (mprotect) : Vulnerable
Executable shared library bss (mprotect) : Vulnerable
Executable shared library data (mprotect): Vulnerable
Executable stack (mprotect) : Vulnerable
Anonymous mapping randomisation test : No randomisation
Heap randomisation test (ET_EXEC) : No randomisation
Heap randomisation test (ET_DYN) : No randomisation
Main executable randomisation (ET_EXEC) : No randomisation
Main executable randomisation (ET_DYN) : No randomisation
Shared library randomisation test : No randomisation
Stack randomisation test (SEGMEXEC) : 9 bits (guessed)
Stack randomisation test (PAGEEXEC) : 9 bits (guessed)
Return to function (strcpy) : Vulnerable
Return to function (strcpy, RANDEXEC) : Vulnerable
Return to function (memcpy) : Vulnerable
Return to function (memcpy, RANDEXEC) : Vulnerable
Executable shared library bss : Vulnerable
Executable shared library data : Vulnerable
Writable text segments : Vulnerable
---------------------------------------------------------------------------------
In case it heps, I'm using the current grsec-1.9.14-2.4.25.patch on an AMD Athlon XP 2700+ with 512MB RAM. I did not enable soft mode -- do I need to do that?
Thanks in advance for any help or insight offered.