PaX Test results seem off
Posted: Mon Dec 10, 2012 1:25 pm
config: http://pastebin.com/KnmZqV1z
blackhat results: http://pastebin.com/UNFnjCkG
Shouldn't I be getting back "return address contains a NULL byte." for the strcopy?
I know checksec.sh also doesn't necessarily report accurately but it's showing features disabled.
I disable privileged I/O on purpose. But I have non-executable kernel pages enabled in my config. And strict user copy checks/ read only kernel data got disabled?
blackhat results: http://pastebin.com/UNFnjCkG
Shouldn't I be getting back "return address contains a NULL byte." for the strcopy?
I know checksec.sh also doesn't necessarily report accurately but it's showing features disabled.
GCC stack protector support: Enabled
Strict user copy checks: Disabled
Enforce read-only kernel data: Disabled
Restrict /dev/mem access: Enabled
Restrict /dev/kmem access: Enabled
* grsecurity / PaX: Custom GRKERNSEC
Non-executable kernel pages: Disabled
Prevent userspace pointer deref: Disabled
Prevent kobject refcount overflow: Enabled
Bounds check heap object copies: Enabled
Disable writing to kmem/mem/port: Enabled
Disable privileged I/O: Disabled
Harden module auto-loading: Enabled
Hide kernel symbols: Enabled
I disable privileged I/O on purpose. But I have non-executable kernel pages enabled in my config. And strict user copy checks/ read only kernel data got disabled?