Public bug reported: $ uname -p aarch64 $ cat /proc/version_signature Ubuntu 3.13.0-63.103-generic 3.13.11-ckt25 $ cat /proc/self/personality 00400000
include/uapi/linux/personality.h in the linux source tree defines "READ_IMPLIES_EXEC = 0x0400000," A patch to start to address this was submitted upstream at https://lkml.org/lkml/2014/5/14/520 but did not get taken. This was noticed by the nx portiong of the qrt test-kernel-security tests on arm64 that indicate that the data sections are allowed to execute code. ** Affects: linux (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1501645 Title: arm64 kernel has READ_IMPLIES_EXEC in personality, makes data areas executable To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1501645/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs