CVE-2019-2182 PUBLISHED

In the Android kernel in the kernel MMU code there is a possible execution path leaving some kernel text and rodata pages writable. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

EPSS 0.03% · 9.7th percentile

Risk Scores

EPSS Score
0.03%
9.7th percentile

Affected Products

VendorProductVersions
Ubuntu:18.04:LTSlinux-gke-4.154.15.0-1044.46, 4.15.0-1045.48, 4.15.0-1048.51
Ubuntu:16.04:LTSlinux-gcp4.15.0-1047.50, 4.15.0-1046.49, 4.15.0-1044.46
Ubuntu:18.04:LTSlinux-oracle4.15.0-1031.34, 4.15.0-1030.33, 4.15.0-1029.32
Ubuntu:18.04:LTSlinux-gcp-edge5.0.0-1011.11~18.04.1, 5.0.0-1013.13~18.04.1, 4.18.0-1015.16~18.04.1
Ubuntu:Pro:14.04:LTSlinux-azure4.15.0-1055.60~14.04.1, 4.15.0-1035.36~14.04.2, 4.15.0-1032.33~14.04.2
Ubuntu:18.04:LTSlinux-snapdragon4.4.0-1078.83, 4.15.0-1071.78, 4.15.0-1072.79
Ubuntu:Pro:FIPS:18.04:LTSlinux-aws-fips0, 4.15.0-2000.4
Ubuntu:Pro:FIPS-updates:18.04:LTSlinux-azure-fips0, 4.15.0-1002.2
Ubuntu:22.04:LTSlinux-realtime0, 5.15.0-1032.35
Ubuntu:Pro:FIPS:18.04:LTSlinux-azure-fips0, 4.15.0-1002.2
Ubuntu:18.04:LTSlinux-oem4.15.0-1038.43, 4.15.0-1036.41, 4.15.0-1035.40
Ubuntu:16.04:LTSlinux-hwe-edge0, 4.8.0-30.32~16.04.1, 4.8.0-32.34~16.04.1
Ubuntu:20.04:LTSlinux-raspi25.3.0-1017.19, 5.4.0-1004.4, 5.4.0-1006.6
Ubuntu:20.04:LTSlinux-gke0, 5.4.0-1033.35, 5.4.0-1035.37
Ubuntu:20.04:LTSlinux-azure-fde5.4.0-1095.101+cvm1.1, 5.4.0-1103.109+cvm1.1, 5.4.0-1100.106+cvm1.1
Ubuntu:16.04:LTSlinux-hwe4.8.0-51.54~16.04.1, 4.15.0-88.88~16.04.1, 0
Ubuntu:16.04:LTSlinux-azure4.13.0-1006.8, 4.15.0-1071.76, 4.15.0-1069.74
Ubuntu:16.04:LTSlinux-oracle4.15.0-1010.12~16.04.1, 4.15.0-1009.11~16.04.1, 4.15.0-1033.36~16.04.1
Ubuntu:18.04:LTSlinux-kvm4.15.0-1027.27, 4.15.0-1052.52, 4.15.0-1051.51
Ubuntu:18.04:LTSlinux-azure4.15.0-1008.8, 5.0.0-1028.30~18.04.1, 5.0.0-1027.29~18.04.1

…and 13 more

Timeline

References

Open in Interactive Console →