[PATCH] UBUNTU: SAUCE: [x86] implement cs-limit nx-emulation for ia32
Kees Cook
kees.cook at canonical.com
Mon May 4 22:36:22 UTC 2009
Hi Tim,
On Mon, May 04, 2009 at 02:31:10PM -0600, Tim Gardner wrote:
> OK - here goes:
>
> https://bugs.edge.launchpad.net/ubuntu/karmic/+source/linux/+bug/369978/comments/3
Thanks! I will be running it on my NX-less laptop as soon as the kernel is
uploaded. :)
BTW, on IRC you'd asked for an example of how this protection could
be seen. The first thing that came to mind was the current Adobe Reader
vulnerability[1]. This software is in our partner repository, and is not
built with our toolchain, leaving it without stack canary protections.
Execution of arbitrary code from the exploits in the wild[2] would be
stopped by NX (and this patch provides NX via CS-limits on hardware that
lacks true NX).
-Kees
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1492
[2] http://www.milw0rm.com/exploits/8569
http://securitylabs.websense.com/content/Blogs/3202.aspx
--
Kees Cook
Ubuntu Security Team
More information about the kernel-team
mailing list