According to the test results in bug 1653889, it looks like this has
been addressed on arm64. Closing bug.

** Changed in: linux (Ubuntu)
       Status: Triaged => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1501645

Title:
  arm64 kernel has READ_IMPLIES_EXEC in personality, makes data areas
  executable

Status in linux package in Ubuntu:
  Fix Released

Bug description:
  $ uname -p
  aarch64
  $ cat /proc/version_signature
  Ubuntu 3.13.0-63.103-generic 3.13.11-ckt25
  $ cat /proc/self/personality
  00400000

  include/uapi/linux/personality.h in the linux source tree defines
  "READ_IMPLIES_EXEC =     0x0400000,"

  A patch to start to address this was submitted upstream at
  https://lkml.org/lkml/2014/5/14/520 but did not get taken.

  This was noticed by the nx portiong of the qrt test-kernel-security
  tests on arm64 that indicate that the data sections are allowed to
  execute code.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1501645/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to