Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAPLrYERO+Jc31kNAxt5h82U4nMWdxoYsqN414u383raxz1RamQ@mail.gmail.com>
Date: Mon, 6 Aug 2012 09:16:10 +0200
From: Daniel Cegiełka <daniel.cegielka@...il.com>
To: musl@...ts.openwall.com
Subject: Re: noexecstack

2012/8/6 orc <orc@...server.ru>:
> On Sun, 5 Aug 2012 23:35:36 +0200

> Correct me if I'm wrong, but this is ugly stuff.
>
> - binutils ld has -z noexecstack command line option.
> - this (GNU_STACK) is binutils-specific (tinycc, for example, does not
>   generate ELFs with that section, and future direction should be on
>   that plain ELFs without any gnuish extensions IMO)
> - Kernel sets executable stack by default, kernel can be patched not to
>   do that (that's one line patch per architecture)

Can you give some example of how to do it? It might be worthwhile to
introduce it into the main repository of Linux. What do you think?

> - binutils can be patched to not produce ELFs with executable stack by
>   default
>
> While some of options I listed here may harm some GCC or binutils
> internals (I don't know), I see an utility that comes with grsecurity
> patches (paxctl) that operates that section (GNU_STACK), converting it
> into it's own.
> I tested a system with patched binutils and kernel (but binutils patch
> here will be enough) without any problems.

It would be very nice if we could solve this problem in this way. I'm
currently using this patch, but this is not the best solution in my
opinion. Ideally if the system (kernel, binutils, libc) enforce
noexecstack by default... definitely worth look closer at this issue.

Thanks,
Daniel

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.