@dalias Ah, backtrace from a signal handler, old friend how I've missed you... https://github.com/rust-lang/rust/pull/133170#issuecomment-2504897012
=> More informations about this toot | More toots from codonell@fosstodon.org
@codonell @dalias
because the worst thing that can happen is for there to be an attacker exploitable defect in this code.
huh thats interesting, has there been a case of this happening?
=> More informations about this toot | More toots from k4lizen@infosec.exchange
@k4lizen @codonell Yes. IIRC there was a fairly high profile one. In general, if attacker already has ability to clobber memory, they may have maliciously modified the GOT, TLS, etc. in ways that make any further calls unsafe. You want the kernel to just terminate the process, not run further code in compromised state.
=> More informations about this toot | More toots from dalias@hachyderm.io
@dalias @codonell
makes sense!
=> More informations about this toot | More toots from k4lizen@infosec.exchange This content has been proxied by September (3851b).Proxy Information
text/gemini