[klibc] Latest kernel reports "process '/bin/sh' started with executable stack"
ben at decadent.org.uk
Fri Feb 28 13:13:37 PST 2020
On Tue, 2020-02-25 at 13:36 -0800, Kees Cook wrote:
> On Thu, Feb 06, 2020 at 04:38:34PM +0100, Christophe Leroy wrote:
> > Indeed, the stack is rwx, which is unexpected. And it is the case for all
> > klibc tools.
> > How can we fix that ?
> klibc uses trampolines for its setjmp implementation. I ran into this
> years ago when eradicating executable stacks from Ubuntu:
I've looked at all the setjmp() implementations and didn't spot any use
If more than one person is responsible for a bug, no one is at fault.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 833 bytes
Desc: This is a digitally signed message part
More information about the klibc