Re: execlineb ELF executable stack on Linux

From: Xavier Stonestreet <xstonestreet_at_gmail.com>
Date: Fri, 9 Apr 2021 16:20:35 +0200

On Fri, Apr 9, 2021 at 3:46 PM Laurent Bercot <ska-skaware_at_skarnet.org> wrote:
>
> Oh! That's interesting

Interesting, and very nasty:

"Fail open design

Since this is the default, the only way to get a non-executable stack
is if every object file input to the linker explicitly declares that
it does not need an executable stack. To request a non-executable
stack, an object file must contain the (empty) section
.note.GNU-stack. If even a single object file fails to do this, then
the final program gets an executable stack.

Not only does one contaminated object file infect the binary,
everything dynamically linked with it also gets an executable stack.
Entire processes are infected! This occurs even via dlopen(), where
the stack is dynamically made executable to accomodate the new shared
object."

Infectious Executable Stacks
<https://nullprogram.com/blog/2019/11/15/>
Received on Fri Apr 09 2021 - 14:20:35 UTC

This archive was generated by hypermail 2.3.0 : Sun May 09 2021 - 19:38:49 UTC