|
发表于 2010-6-28 21:21:53
|
显示全部楼层
内核打过 grsecurity 补丁?
那么试试 chpax。
http://etutorials.org/Networking ... el+with+grsecurity/The High security level also enables grsecurity's PaX code, which enables nonexecutable memory pages. Enabling this will cause many buffer overrun exploits to fail, since any code injected into the stack through an overrun will be unable to execute. However, it is still possible to exploit a program with buffer overrun vulnerabilities, although this is made much more difficult by grsecurity's address space layout randomization features. PaX can also carry with it some performance penalties on the x86 architecture, although they are said to be minimal. In addition, some programs?such as XFree86, wine, and Java© virtual machines?will expect that the memory addresses returned by malloc() will be executable. Unfortunately, PaX breaks this behavior, so enabling it will cause those programs and others that depend on it to fail. Luckily, PaX can be disabled on a per-program basis with the chpax utility (http://chpax.grsecurity.net).
To disable PaX for a program, you can run a command similar to this one:
# chpax -ps /usr/bin/java
也许内核版本问题。
http://www.winehq.org/pipermail/ ... ebruary/020545.html |
|