[klibc] Latest kernel reports "process '/bin/sh' started with executable stack"

Ben Hutchings ben at decadent.org.uk
Fri Feb 28 13:13:37 PST 2020


On Tue, 2020-02-25 at 13:36 -0800, Kees Cook wrote:
> On Thu, Feb 06, 2020 at 04:38:34PM +0100, Christophe Leroy wrote:
[...]
> > Indeed, the stack is rwx, which is unexpected. And it is the case for all
> > klibc tools.
> > 
> > How can we fix that ?
> 
> klibc uses trampolines for its setjmp implementation. I ran into this
> years ago when eradicating executable stacks from Ubuntu:
> https://wiki.ubuntu.com/SecurityTeam/Roadmap/ExecutableStacks

I've looked at all the setjmp() implementations and didn't spot any use
of trampolines.

Ben.

-- 
Ben Hutchings
If more than one person is responsible for a bug, no one is at fault.


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: This is a digitally signed message part
URL: <https://lists.zytor.com/archives/klibc/attachments/20200228/0931c8ec/attachment.sig>


More information about the klibc mailing list