Hopefully the future "pointer encryption" routines in libc will help
head this off as well.  Patches are welcome, though I suspect, as you
say, there are many more things beyond just "/bin/sh" in the libc code,
including possible register build-up chaining[1], which would be nearly
impossible to stop without lots of work.

[1] http://www.suse.de/~krahmer/no-nx.pdf

** Changed in: glibc (Ubuntu)
   Importance: Undecided => Wishlist
       Status: New => Confirmed

-- 
[SECURITY] glibc contains paths to useful binaries
https://bugs.launchpad.net/bugs/139592
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to