Actually, setting /proc/sys/kernel/randomize_va_space to 0 makes this
worse because it forces the brk (heap) area to immediately follow the
text area, and the NX emulation patch performs randomization of exec
regions no matter what randomize_va_space is.  It seems the solution
here is to fix up the brk starting position to be outside the area used
for exec regions.

-- 
Random segfaults when using ld.so explicitly to start a program
https://bugs.launchpad.net/bugs/452175
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to