mmap occasionally infringes on stack
This document (7004855) is provided subject to the disclaimer at the end of this document.
SUSE Linux Enterprise Server 10 Service Pack 2
SUSE Linux Enterprise Server 10 Service Pack 3
created by a given process to silently overlap with its stack address space.
This can cause silent corruption of the data that belongs to the affected process.
The problem is relevant only in the case when randomised address
space is enabled, which is the default behaviour on SLES.
The problem is specific to the x86_64 architecture, and it has been
verified that it affects:
- SUSE Linux Enterprise Server 11 (SLES11) kernel release 126.96.36.199-0.1
- SLES11, kernel release 188.8.131.52-0.1
The problem has not been reproduced on older SLES11 kernel
releases, SLES10SP2, or SLES10SP3 kernels but it's likely that they're
SLES11 kernel update 184.108.40.206-0.1.1.
SLES10 SP2 kernel update 220.127.116.11-0.42.7
SLES10 SP3 kernel update 18.104.22.168-0.57.1.
- Either at boot time by adding the kernel boot parameter
"norandmaps" to the kernel boot command line.
- Or via sysctl:
- add the following line to the /etc/sysctl.conf file
kernel.randomize_va_space = 0
- run sysctl -p for the change to take effect.
This Support Knowledgebase provides a valuable tool for SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.
- Document ID:7004855
- Creation Date: 12-Nov-2009
- Modified Date:28-Sep-2022
- SUSE Linux Enterprise Server
For questions or concerns with the SUSE Knowledgebase please contact: tidfeedback[at]suse.com