[Bug 1725348] Re: Systemd - Bypassing MemoryDenyWriteExecution policy
Ubuntu Foundations Team Bug Bot
1725348 at bugs.launchpad.net
Mon Nov 13 12:24:27 UTC 2017
The attachment "0001-shared-seccomp-disallow-pkey_mprotect-the-same-as-
mp.patch" seems to be a patch. If it isn't, please remove the "patch"
flag from the attachment, remove the "patch" tag, and if you are a
member of the ~ubuntu-reviewers, unsubscribe the team.
[This is an automated message performed by a Launchpad user owned by
~brian-murray, for any issues please contact him.]
** Tags added: patch
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1725348
Title:
Systemd - Bypassing MemoryDenyWriteExecution policy
Status in systemd package in Ubuntu:
New
Status in systemd source package in Xenial:
New
Status in systemd source package in Zesty:
New
Status in systemd source package in Artful:
New
Status in systemd source package in Bionic:
New
Bug description:
Hello,
We would like to report to you a vulnerability about systemd which
allows to bypass the MemoryDenyWriteExecution policy on Linux 4.9+.
The vulnerability is described in the attached PDF file.
Sincerely,
Thomas IMBERT
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1725348/+subscriptions
More information about the foundations-bugs
mailing list