Bug 191216
Summary: | Security appears to be getting worse on newer installs | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 4 | Reporter: | Chris <chris> |
Component: | kernel | Assignee: | Ingo Molnar <mingo> |
Status: | CLOSED WONTFIX | QA Contact: | Brian Brock <bbrock> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 4.0 | CC: | jbaron |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | i686 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2012-06-20 16:03:28 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Chris
2006-05-09 19:59:24 UTC
If your CPU doesn't support NX, then execshield only protects against execution the continuous chunk of memory from the end of highest VMA that needs executable permissions till the end of address space. There really is no difference in this between RHEL3 and RHEL4, just RHEL4 /proc/*/maps make this explicit (not sure if that's intentional or not). glibc certainly uses the right mmap/mprotect flags, so that only pages that need execution are executable, the rest is kernel thing. From the first list, libgnat*.so (and other Ada related stuff) are intentionally PT_GNU_STACK RWE, as Ada needs executable trampolines on most platforms. But the libraries are also flagged with DF_1_NOOPEN, so they can't be dlopened. GCC 2.96-RH crt files are not marked at all, because exec stack marking was only added in much later GCC versions and these are only included for compatibility. Thank you for submitting this issue for consideration in Red Hat Enterprise Linux. The release for which you requested us to review is now End of Life. Please See https://access.redhat.com/support/policy/updates/errata/ If you would like Red Hat to re-consider your feature request for an active release, please re-open the request via appropriate support channels and provide additional supporting details about the importance of this issue. |