Hopefully the future "pointer encryption" routines in libc will help head this off as well. Patches are welcome, though I suspect, as you say, there are many more things beyond just "/bin/sh" in the libc code, including possible register build-up chaining[1], which would be nearly impossible to stop without lots of work.
[1] http://www.suse.de/~krahmer/no-nx.pdf ** Changed in: glibc (Ubuntu) Importance: Undecided => Wishlist Status: New => Confirmed -- [SECURITY] glibc contains paths to useful binaries https://bugs.launchpad.net/bugs/139592 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
