Description
The paravirt_ops_setup function in arch/x86/kernel/kvm.c in the Linux
kernel through 3.18 uses an improper paravirt_enabled setting for KVM guest
kernels, which makes it easier for guest OS users to bypass the ASLR
protection mechanism via a crafted application that reads a 16-bit value.
Ubuntu-Description
An information leak in the Linux kernel was discovered that could leak the
high 16 bits of the kernel stack address on 32-bit Kernel Virtual Machine
(KVM) paravirt guests. A user in the guest OS could exploit this leak to
obtain information that could potentially be used to aid in attacking the
kernel.
Notes
jdstrand | android kernels (flo, goldfish, grouper, maguro, mako and manta) are
not supported on the Ubuntu Touch 14.04 preview kernels
linux-lts-saucy no longer receives official support
linux-lts-quantal no longer receives official support |
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | released
(3.2.0-74.109)
|
Ubuntu 14.04 ESM (Trusty Tahr): | released
(3.13.0-43.72)
|
Ubuntu 16.04 LTS (Xenial Xerus): | not-affected
(4.2.0-16.19)
|
Patches:
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
(precise was released [3.2.0-1642.61])
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
This package is not directly supported by the Ubuntu Security Team
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | not-affected
(4.4.0-1002.2)
|
Ubuntu 16.04 LTS (Xenial Xerus): | not-affected
(4.4.0-1001.10)
|
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was ignored)
|
Ubuntu 16.04 LTS (Xenial Xerus): | ignored
(abandoned)
|
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | not-affected
(4.4.0-1003.3)
|
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was ignored)
|
Ubuntu 16.04 LTS (Xenial Xerus): | ignored
(abandoned)
|
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was ignored)
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | not-affected
(4.8.0-36.36~16.04.1)
|
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | not-affected
(4.8.0-36.36~16.04.1)
|
Product
linux-krillin: | ignored
(was needed now end-of-life)
|
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
(precise was ignored [abandoned])
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
(precise was ignored [abandoned])
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
(precise was ignored [abandoned])
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
(precise was ignored [was pending [3.5.0-60.87~precise1] OEM release])
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
(precise was ignored [was needs-triage now end-of-life])
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
(precise was ignored [was pending [3.11.0-32.53~precise1] OEM release])
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
This package is not directly supported by the Ubuntu Security Team
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | released
(3.13.0-43.72~precise1)
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was released [3.16.0-28.37~14.04.1])
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was not-affected [3.19.0-18.18~14.04.1])
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was not-affected [4.2.0-18.22~14.04.1])
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | not-affected
(4.4.0-13.29~14.04.1)
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was ignored)
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was ignored)
|
Ubuntu 16.04 LTS (Xenial Xerus): | ignored
(abandoned)
|
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was ignored)
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
(precise was ignored [abandoned])
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | not-affected
(4.2.0-1013.19)
|
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | not-affected
(4.4.0-1012.12)
|
Package
Upstream: | released
(3.19~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
(precise was released [3.2.0-1458.78])
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Product
linux-vegetahd: | ignored
(was needed now end-of-life)
|
Updated: 2019-12-05 18:38:30 UTC (commit dd38ff22974aae499eb50644b9d5a2817483cbdb)