Bug 630562

Summary: kernel: additional stack guard patches [rhel-6.1]
Product: Red Hat Enterprise Linux 6 Reporter: Eugene Teo (Security Response) <eteo>
Component: kernelAssignee: Johannes Weiner <jweiner>
Status: CLOSED NOTABUG QA Contact: Petr Beňas <pbenas>
Severity: high Docs Contact:
Priority: high    
Version: 6.1CC: arozansk, cebbert, davej, dhoward, eteo, fhrbata, jwest, kmcmartin, lwang, lwoodman, pbenas, pstehlik, qcai, snagar
Target Milestone: rcKeywords: ZStream
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: kernel-2.6.32-92.el6 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
: 630563 630564 (view as bug list) Environment:
Last Closed: 2011-01-25 08:06:26 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 630563, 630564, 666796    

Description Eugene Teo (Security Response) 2010-09-06 08:28:56 UTC
Description of problem:
Please backport:
  mm: make the mlock() stack guard page checks stricter
  7798330ac8114c731cfab83e634c6ecedaa233d7

  guard page for stacks that grow upwards
  8ca3eb08097f6839b2206e2242db4179aee3cfb3

  x86: don't send SIGBUS for kernel page faults
  96054569190bdec375fe824e48ca1f4e3b53dd36

Comment 2 Eugene Teo (Security Response) 2010-09-06 08:37:25 UTC
>   guard page for stacks that grow upwards
>   8ca3eb08097f6839b2206e2242db4179aee3cfb3

  testcase: http://lkml.org/lkml/2010/8/24/326
  https://patchwork.kernel.org/patch/127431/

Comment 5 Aristeu Rozanski 2010-12-16 20:54:14 UTC
Patch(es) available on kernel-2.6.32-92.el6