> -----Original Message----- > From: Naresh Kamboju [mailto:[email protected]] > Sent: Friday, June 1, 2018 12:55 AM > To: Daniel Sangorrin <[email protected]> > Cc: Greg Kroah-Hartman <[email protected]>; open list > <[email protected]>; linux- stable <[email protected]>; > Davidlohr Bueso <[email protected]>; Joe Lawrence <[email protected]>; > Andrea Arcangeli <[email protected]>; Manfred Spraul > <[email protected]>; Andrew Morton <[email protected]>; > Linus Torvalds <[email protected]> > Subject: Re: [PATCH 4.4 011/268] Revert "ipc/shm: Fix shmat mmap nil-page > protection" > > On 31 May 2018 at 13:06, Daniel Sangorrin > <[email protected]> wrote: > >> -----Original Message----- > >> From: 'Greg Kroah-Hartman' [mailto:[email protected]] > > .. > >> Thanks for letting us know, but this was reported already. See the > >> emails on lkml with the subject: > >> Subject: Re: [PATCH 4.16 000/272] 4.16.13-stable review > >> from Davidlohr Bueso > >> Message-ID: <20180528213039.yy2madue67njkmw5@linux-n805> > >> > >> where he discusses that the LTP test is incorrect and that the kernel > >> change is correct and that LTP is going to be fixed because of this. > > My two cents, > If you are referring to cve-2017-5669.c > LTP test case is been fixed few hours ago by Rafael Tinoco, > > - shm_addr = shmat(shm_id, ((void *)1), SHM_RND); > + shm_addr = shmat(shm_id, ((void *)1), SHM_RND | SHM_REMAP); > > LTP patch pull request and it is been merged. > https://github.com/linux-test-project/ltp/pull/324
Thanks a lot Naresh. I confirmed that the latest LTP cve-2017-5669 now PASSes. Thanks, Daniel

