First published: Wed Nov 27 2019(Updated: )
A flaw was found in the way the Linux kernel implemented a software flush of the Count Cache (indirect branch cache) and Link (Return Address) Stack on the PowerPC platform. The flushing of these structures helps to prevent SpectreRSB like attacks which may leak information from one user process to another. An unprivileged user could use this flaw to cross the syscall or process boundary and read privileged memory by conducting targeted cache side-channel attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.32-754.31.1.el6 | 0:2.6.32-754.31.1.el6 |
redhat/kernel-alt | <0:4.14.0-115.17.1.el7a | 0:4.14.0-115.17.1.el7a |
redhat/kernel | <0:3.10.0-1127.el7 | 0:3.10.0-1127.el7 |
redhat/kernel | <0:3.10.0-957.56.1.el7 | 0:3.10.0-957.56.1.el7 |
redhat/kernel | <0:3.10.0-1062.21.1.el7 | 0:3.10.0-1062.21.1.el7 |
redhat/kernel | <0:4.18.0-147.8.1.el8_1 | 0:4.18.0-147.8.1.el8_1 |
redhat/kernel | <0:4.18.0-80.23.2.el8_0 | 0:4.18.0-80.23.2.el8_0 |
IBM Data Risk Manager | <=2.0.6 | |
Linux Kernel | <5.4.1 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =19.04 | |
Ubuntu | =19.10 | |
Fedora | =30 | |
Fedora | =31 | |
SUSE Linux | =15.1 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-18660 is rated as a medium-severity vulnerability in the Linux kernel impacting the PowerPC platform.
To fix CVE-2019-18660, update your Linux kernel to the appropriate remedial version for your distribution.
CVE-2019-18660 affects various versions of the Linux kernel, including certain Red Hat, Ubuntu, Fedora, and openSUSE systems.
CVE-2019-18660 is a flaw related to insufficient flushing of the Count Cache and Link Stack, potentially leading to information leaks.
While you can still use your system, it is strongly recommended to apply the necessary patches to mitigate the risk of exploitation.