$ rmadison --arch=s390x linux-generic | grep eoan-proposed
linux-generic | 5.2.0.8.9 | eoan-proposed | s390x
$ git tag --contains cd479eccd2
Ubuntu-5.2.0-8.9
v5.2
$ git show cd479eccd2
commit cd479eccd2e057116d504852814402a1e68ead80
Author: Martin Schwidefsky <[email protected]>
Date: Mon Mar 4 12:33:28 2019 +0100
s390: limit brk randomization to 32MB
For a 64-bit process the randomization of the program break is quite
large with 1GB. That is as big as the randomization of the anonymous
mapping base, for a test case started with '/lib/ld64.so.1 <exec>'
it can happen that the heap is placed after the stack. To avoid
this limit the program break randomization to 32MB for 64-bit and
keep 8MB for 31-bit.
Reported-by: Stefan Liebler <[email protected]>
Signed-off-by: Martin Schwidefsky <[email protected]>
With that changing status to Fix Committed.
** Changed in: linux (Ubuntu)
Status: New => Fix Committed
** Changed in: ubuntu-z-systems
Status: Incomplete => Fix Committed
** Information type changed from Private to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1832626
Title:
[19.10 FEAT] kernel address space layout randomization
Status in Ubuntu on IBM z Systems:
Fix Committed
Status in linux package in Ubuntu:
Fix Committed
Bug description:
With kernel address space layout randomization (KASLR), the kernel can be
loaded to a random location
in memory.
Protecting against certain attacks that rely on knowledge of the
kernel addresses.
Available with kernel 5.2
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1832626/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp