First published: Mon Jun 24 2019(Updated: )
It was discovered that the Linux kernel did not properly separate certain memory mappings when creating new userspace processes on 64-bit Power (ppc64el) systems. A local attacker could use this to access memory contents or cause memory corruption of other processes on the system.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-5.0.0-19-generic | <5.0.0-19.20 | 5.0.0-19.20 |
=19.04 | ||
All of | ||
ubuntu/linux-image-generic | <5.0.0.19.20 | 5.0.0.19.20 |
=19.04 | ||
All of | ||
ubuntu/linux-image-virtual | <5.0.0.19.20 | 5.0.0.19.20 |
=19.04 | ||
All of | ||
ubuntu/linux-image-4.18.0-24-generic | <4.18.0-24.25 | 4.18.0-24.25 |
=18.10 | ||
All of | ||
ubuntu/linux-image-generic | <4.18.0.24.25 | 4.18.0.24.25 |
=18.10 | ||
All of | ||
ubuntu/linux-image-powerpc-e500mc | <4.18.0.24.25 | 4.18.0.24.25 |
=18.10 | ||
All of | ||
ubuntu/linux-image-powerpc-smp | <4.18.0.24.25 | 4.18.0.24.25 |
=18.10 | ||
All of | ||
ubuntu/linux-image-powerpc64-emb | <4.18.0.24.25 | 4.18.0.24.25 |
=18.10 | ||
All of | ||
ubuntu/linux-image-powerpc64-smp | <4.18.0.24.25 | 4.18.0.24.25 |
=18.10 | ||
All of | ||
ubuntu/linux-image-virtual | <4.18.0.24.25 | 4.18.0.24.25 |
=18.10 | ||
All of | ||
ubuntu/linux-image-4.18.0-24-generic | <4.18.0-24.25~18.04.1 | 4.18.0-24.25~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-generic-hwe-18.04 | <4.18.0.24.74 | 4.18.0.24.74 |
=18.04 | ||
All of | ||
ubuntu/linux-image-virtual-hwe-18.04 | <4.18.0.24.74 | 4.18.0.24.74 |
=18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.