On 29.04.20 15:36, Ben Hutchings wrote:
> Control: tag -1 upstream fixed-upstream patch
> 
> On Wed, 2020-04-29 at 14:12 +1000, Russell Coker wrote:
>> Package: klibc-utils
>> Version: 2.0.7-1
>> Severity: normal
>>
>> root@sevm:~/pol# /usr/lib/klibc/bin/fstype < /dev/sda2
>> Segmentation fault
>> root@sevm:~/pol# execstack -c /usr/lib/klibc/bin/fstype
>> root@sevm:~/pol# /usr/lib/klibc/bin/fstype < /dev/sda2
>> FSTYPE=btrfs
>> FSSIZE=719360278528
>>
>> The fstype program is listed as needing an executable stack, which will cause
>> it to crash when run on a system with a security policy preventing executable
>> stacke.  If you clear the execstack bit it appears to work correctly.
> [...]
> 
> I've fixed this upstream but not made a new release yet:
> 
> https://git.kernel.org/pub/scm/libs/klibc/klibc.git/commit/?id=9d8d648e604026b32cad00a84ed6c29cbd157641

On hppa/parisc we still need executable stacks for the signal trampoline return 
code. 
Might your patch then maybe break fstype on hppa? 
I didn't tested it...

Helge

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to