Píše se tam mimo jiné:
"On August 25th, we discovered a researcher’s post on Twitter about his independent implementation of an exploit against libstagefright. His post shows his exploit works against Android 5.0 running in the emulator. This is consistent with information that a student and independent researcher posted on Twitter stating he had managed to bypass ASLR using an information leakage vulnerability in Stagefright. In the event additional public exploits surface, please exercise caution before running them, as they may contain"
Tzn. tenhle konkrétní exploit se s ASLR vypořádat neumí, ale někdo jiný našel na danou chybu i takový druh exploitu, vůči kterému je i standardní ASLR krátké. Chtělo by to GRsecurity/PaX ;-) Takže jedině Copperhead OS!
No len dufam ze ten Copperhead OS prispieva na grsecurity inac to budu mat dost tazke: http://grsecurity.net/announce.php
No tak to neviem posudit, ale ja osobne ak by som mal implementovat nieco take tak radsej na odladenej verzii ako na nejakej test. Ako sa pisalo v spravicke predsa len implementacia grsecurity a PAX na androida nieje ziadna sranda a ak implementujem nieco na zlepsenie bezpecnosti tak urcite by som tam tiez nedaval test verziu ktora moze mat vazne chyby.