[klibc] Latest kernel reports "process '/bin/sh' started with executable stack"
Ben Hutchings
ben at decadent.org.uk
Fri Feb 28 13:13:37 PST 2020
On Tue, 2020-02-25 at 13:36 -0800, Kees Cook wrote:
> On Thu, Feb 06, 2020 at 04:38:34PM +0100, Christophe Leroy wrote:
[...]
> > Indeed, the stack is rwx, which is unexpected. And it is the case for all
> > klibc tools.
> >
> > How can we fix that ?
>
> klibc uses trampolines for its setjmp implementation. I ran into this
> years ago when eradicating executable stacks from Ubuntu:
> https://wiki.ubuntu.com/SecurityTeam/Roadmap/ExecutableStacks
I've looked at all the setjmp() implementations and didn't spot any use
of trampolines.
Ben.
--
Ben Hutchings
If more than one person is responsible for a bug, no one is at fault.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: This is a digitally signed message part
URL: <https://lists.zytor.com/archives/klibc/attachments/20200228/0931c8ec/attachment.sig>
More information about the klibc
mailing list