arm64 kernel has READ_IMPLIES_EXEC in personality, makes data areas executable

Bug #1501645 reported by Steve Beattie
8
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
Fix Released
High
Unassigned

Bug Description

$ uname -p
aarch64
$ cat /proc/version_signature
Ubuntu 3.13.0-63.103-generic 3.13.11-ckt25
$ cat /proc/self/personality
00400000

include/uapi/linux/personality.h in the linux source tree defines "READ_IMPLIES_EXEC = 0x0400000,"

A patch to start to address this was submitted upstream at https://lkml.org/lkml/2014/5/14/520 but did not get taken.

This was noticed by the nx portiong of the qrt test-kernel-security tests on arm64 that indicate that the data sections are allowed to execute code.

Revision history for this message
Brad Figg (brad-figg) wrote : Missing required logs.

This bug is missing log files that will aid in diagnosing the problem. From a terminal window please run:

apport-collect 1501645

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the Ubuntu Kernel Team.

Changed in linux (Ubuntu):
status: New → Incomplete
Changed in linux (Ubuntu):
importance: Undecided → High
tags: added: kernel-da-key trusty
Changed in linux (Ubuntu):
status: Incomplete → Triaged
Revision history for this message
Steve Beattie (sbeattie) wrote :

According to the test results in bug 1653889, it looks like this has been addressed on arm64. Closing bug.

Changed in linux (Ubuntu):
status: Triaged → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.