First published: Fri Mar 03 2023(Updated: )
Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-server | <3.13.0.192.202 | 3.13.0.192.202 |
=14.04 | ||
All of | ||
ubuntu/linux-image-3.13.0-192-generic | <3.13.0-192.243 | 3.13.0-192.243 |
=14.04 | ||
All of | ||
ubuntu/linux-image-virtual | <3.13.0.192.202 | 3.13.0.192.202 |
=14.04 | ||
All of | ||
ubuntu/linux-image-generic-lts-trusty | <3.13.0.192.202 | 3.13.0.192.202 |
=14.04 | ||
All of | ||
ubuntu/linux-image-3.13.0-192-lowlatency | <3.13.0-192.243 | 3.13.0-192.243 |
=14.04 | ||
All of | ||
ubuntu/linux-image-generic | <3.13.0.192.202 | 3.13.0.192.202 |
=14.04 | ||
All of | ||
ubuntu/linux-image-lowlatency | <3.13.0.192.202 | 3.13.0.192.202 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Linux kernel vulnerability is USN-5916-1.
Jann Horn discovered this Linux kernel vulnerability.
This Linux kernel vulnerability can be used by a local attacker to cause a denial of service (system crash) or possibly execute arbitrary code.
Ubuntu 14.04 with the specific kernel versions mentioned in the vulnerability description are affected.
Update the affected Ubuntu packages to the recommended versions listed in the vulnerability description.