Description
Linux distributions that have not patched their long-term kernels with
https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86
(committed on April 14, 2015). This kernel vulnerability was fixed in April
2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to
Linux 3.10.77 in May 2015), but it was not recognized as a security threat.
With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down
address allocation strategy, load_elf_binary() will attempt to map a PIE
binary into an address range immediately below mm->mmap_base.
Unfortunately, load_elf_ binary() does not take account of the need to
allocate sufficient space for the entire binary which means that, while the
first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD
segment(s) end up being mapped above mm->mmap_base into the are that is
supposed to be the "gap" between the stack and the binary.
Notes
| sbeattie | fixed upstream in 4.1, so xenial and newer had it
went through stable, trusty had it in 3.13.0-56.93,
precise in 3.2.0-91.129, vivid in 3.19.0-19.19 |
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | not-affected
(4.13.0-16.19)
|
| Ubuntu 16.04 ESM: | not-affected
(4.2.0-16.19)
|
| Ubuntu 14.04 ESM: | released
(3.13.0-57.95)
|
Patches:
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | not-affected
(4.15.0-1001.1)
|
| Ubuntu 16.04 ESM: | not-affected
(4.4.0-1001.10)
|
| Ubuntu 14.04 ESM: | not-affected
(4.4.0-1002.2)
|
Patches:
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | not-affected
(4.15.0-1002.2)
|
| Ubuntu 16.04 ESM: | not-affected
(4.11.0-1009.9)
|
| Ubuntu 14.04 ESM: | not-affected
(4.15.0-1023.24~14.04.1)
|
Patches:
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | not-affected
(4.15.0-1001.1)
|
| Ubuntu 16.04 ESM: | not-affected
(4.10.0-1004.4)
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | not-affected
|
| Ubuntu 16.04 ESM: | not-affected
(4.8.0-36.36~16.04.1)
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | released
(4.18.0-8.9~18.04.1)
|
| Ubuntu 16.04 ESM: | not-affected
(4.8.0-36.36~16.04.1)
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | not-affected
(4.15.0-1002.2)
|
| Ubuntu 16.04 ESM: | not-affected
(4.4.0-1004.9)
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
(trusty was ignored [out of standard support])
|
Patches:
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
(trusty was ignored [was needs-triage now end-of-life])
|
Patches:
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
(trusty was ignored [out of standard support])
|
Patches:
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | not-affected
(4.4.0-13.29~14.04.1)
|
Patches:
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | not-affected
(4.15.0-1002.3)
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | not-affected
(4.13.0-1005.5)
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
| Upstream: | released
(4.1~rc1)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
Updated: 2022-04-13 12:51:31 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)