Novell is now a part of Micro Focus

My Favorites


Please to see your favorites.

mmap occasionally infringes on stack

This document (7004855) is provided subject to the disclaimer at the end of this document.


SUSE Linux Enterprise Server 11
SUSE Linux Enterprise Server 10 Service Pack 2
SUSE Linux Enterprise Server 10 Service Pack 3


The Linux kernel has a flaw that can potentially cause memory mappings
created by a given process to silently overlap with its stack address space.
This can cause silent corruption of the data that belongs to the affected process.

The problem is relevant only in the case when randomised address
space is enabled, which is the default behaviour on SLES.

The problem is specific to the x86_64 architecture, and it has been
verified that it affects:

- SUSE Linux Enterprise Server 11 (SLES11) kernel release
- SLES11, kernel release

The problem has not been reproduced on older SLES11 kernel
releases, SLES10SP2, or SLES10SP3 kernels but it's likely that they're
equally affected.


Problem is resolved in

SLES11 kernel update
SLES10 SP2 kernel update
SLES10 SP3 kernel update

Additional Information

In the rare cases where a kernelupdate is not an option, a workaround is to disable randomisation.

- Either at boot time by adding the kernel boot parameter
"norandmaps" to the kernel boot command line.

- Or via sysctl:

- add the following line to the /etc/sysctl.conf file
kernel.randomize_va_space = 0

- run sysctl -p for the change to take effect.


This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

  • Document ID:7004855
  • Creation Date:12-NOV-09
  • Modified Date:27-APR-12
    • SUSESUSE Linux Enterprise Server

Did this document solve your problem? Provide Feedback