← Back to team overview

kernel-packages team mailing list archive

[Bug 1501645] [NEW] arm64 kernel has READ_IMPLIES_EXEC in personality, makes data areas executable

 

Public bug reported:

$ uname -p
aarch64
$ cat /proc/version_signature
Ubuntu 3.13.0-63.103-generic 3.13.11-ckt25
$ cat /proc/self/personality
00400000

include/uapi/linux/personality.h in the linux source tree defines
"READ_IMPLIES_EXEC =     0x0400000,"

A patch to start to address this was submitted upstream at
https://lkml.org/lkml/2014/5/14/520 but did not get taken.

This was noticed by the nx portiong of the qrt test-kernel-security
tests on arm64 that indicate that the data sections are allowed to
execute code.

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1501645

Title:
  arm64 kernel has READ_IMPLIES_EXEC in personality, makes data areas
  executable

Status in linux package in Ubuntu:
  New

Bug description:
  $ uname -p
  aarch64
  $ cat /proc/version_signature
  Ubuntu 3.13.0-63.103-generic 3.13.11-ckt25
  $ cat /proc/self/personality
  00400000

  include/uapi/linux/personality.h in the linux source tree defines
  "READ_IMPLIES_EXEC =     0x0400000,"

  A patch to start to address this was submitted upstream at
  https://lkml.org/lkml/2014/5/14/520 but did not get taken.

  This was noticed by the nx portiong of the qrt test-kernel-security
  tests on arm64 that indicate that the data sections are allowed to
  execute code.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1501645/+subscriptions


Follow ups