[Cin] executable stacks are bad...m-kay?
Rob Prowel
rprowel at comcast.net
Wed Jan 11 10:52:18 CET 2023
Thought this went away in my Jan-2023 git pull, but apparently not.
Looked in my dmesg output and saw this again.
process 'sharebin/cingg2301/bin/cin' started with executable stack
Why? A consequence of the plug-in system? a poorly designed 3rdparty
library? an oversight?
stack segments are generally marked as no-exec to protect against using
them to execute rogue instructions by saving those instructions in
auto-vars on the stack that could be executed by fudging the return
address of a function.
Just looking for an acknowledgement of this, and any relevant related
history at this point.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0x36472CAD382840B8.asc
Type: application/pgp-keys
Size: 632 bytes
Desc: OpenPGP public key
URL: <https://lists.cinelerra-gg.org/pipermail/cin/attachments/20230111/dac8d736/attachment.skr>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 236 bytes
Desc: OpenPGP digital signature
URL: <https://lists.cinelerra-gg.org/pipermail/cin/attachments/20230111/dac8d736/attachment.sig>
More information about the Cin
mailing list