[19.10 FEAT] kernel address space layout randomization
Bug #1832626 reported by
bugproxy
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Ubuntu on IBM z Systems |
Fix Released
|
High
|
Frank Heimes | ||
linux (Ubuntu) |
Fix Released
|
Undecided
|
Skipper Bug Screeners |
Bug Description
With kernel address space layout randomization (KASLR), the kernel can be loaded to a random location
in memory.
Protecting against certain attacks that rely on knowledge of the kernel addresses.
Available with kernel 5.2
tags: | added: architecture-s39064 bugnameltc-178130 severity-high targetmilestone-inin1910 |
Changed in ubuntu: | |
assignee: | nobody → Skipper Bug Screeners (skipper-screen-team) |
affects: | ubuntu → linux (Ubuntu) |
Changed in ubuntu-z-systems: | |
importance: | Undecided → High |
assignee: | nobody → Canonical Kernel Team (canonical-kernel-team) |
assignee: | Canonical Kernel Team (canonical-kernel-team) → nobody |
assignee: | nobody → Frank Heimes (frank-heimes) |
To post a comment you must log in.
Set to Incomplete until kernel 5.2 lands in eoan.