Public bug reported:

$ uname -p
aarch64
$ cat /proc/version_signature
Ubuntu 3.13.0-63.103-generic 3.13.11-ckt25
$ cat /proc/self/personality
00400000

include/uapi/linux/personality.h in the linux source tree defines
"READ_IMPLIES_EXEC =     0x0400000,"

A patch to start to address this was submitted upstream at
https://lkml.org/lkml/2014/5/14/520 but did not get taken.

This was noticed by the nx portiong of the qrt test-kernel-security
tests on arm64 that indicate that the data sections are allowed to
execute code.

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1501645

Title:
  arm64 kernel has READ_IMPLIES_EXEC in personality, makes data areas
  executable

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1501645/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to