[USN-3674-1] Linux kernel vulnerabilities
Several security issues were fixed in the Linux kernel.
It was discovered that the netfilter subsystem of the Linux kernel did not
properly validate ebtables offsets. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2018-1068)
It was discovered that a NULL pointer dereference existed in the RDS
(Reliable Datagram Sockets) protocol implementation in the Linux kernel. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2018-7492)
Eyal Itkin discovered that the USB displaylink video adapter driver in the
Linux kernel did not properly validate mmap offsets sent from userspace. A
local attacker could use this to expose sensitive information (kernel
memory) or possibly execute arbitrary code. (CVE-2018-8781)
Xingyuan Lin discovered that a out-of-bounds read existed in the USB Video
Class (UVC) driver of the Linux kernel. A local attacker could use this to
expose sensitive information (kernel memory). (CVE-2017-0627)
Package | Affected Version |
---|---|
pkg:deb/ubuntu/linux-image-extra-3.13.0-151-generic?distro=trusty | < 3.13.0-151.201 |
pkg:deb/ubuntu/linux-image-3.13.0-151-powerpc64-smp?distro=trusty | < 3.13.0-151.201 |
pkg:deb/ubuntu/linux-image-3.13.0-151-powerpc64-emb?distro=trusty | < 3.13.0-151.201 |
pkg:deb/ubuntu/linux-image-3.13.0-151-powerpc-smp?distro=trusty | < 3.13.0-151.201 |
pkg:deb/ubuntu/linux-image-3.13.0-151-powerpc-e500mc?distro=trusty | < 3.13.0-151.201 |
pkg:deb/ubuntu/linux-image-3.13.0-151-powerpc-e500?distro=trusty | < 3.13.0-151.201 |
pkg:deb/ubuntu/linux-image-3.13.0-151-lowlatency?distro=trusty | < 3.13.0-151.201 |
pkg:deb/ubuntu/linux-image-3.13.0-151-generic?distro=trusty | < 3.13.0-151.201 |
pkg:deb/ubuntu/linux-image-3.13.0-151-generic-lpae?distro=trusty | < 3.13.0-151.201 |
- ID
- USN-3674-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-3674-1
- Published
-
2018-06-11T18:35:47
(6 years ago) - Modified
-
2018-06-11T18:35:47
(6 years ago) - Other Advisories
-
- ALAS-2018-1023
- ALAS-2018-971
- ALAS2-2018-1023
- ALAS2-2018-971
- ALAS2-2018-994
- DSA-4187-1
- DSA-4188-1
- ELSA-2018-1318
- ELSA-2018-3083
- ELSA-2018-4071
- ELSA-2018-4109
- ELSA-2018-4110
- ELSA-2018-4164
- ELSA-2018-4242
- ELSA-2018-4245
- ELSA-2018-4246
- ELSA-2018-4250
- FEDORA-2018-296bf0c332
- FEDORA-2018-959aac67a3
- RHSA-2018:1318
- RHSA-2018:1355
- RHSA-2018:3083
- RHSA-2018:3096
- SUSE-SU-2018:0785-1
- SUSE-SU-2018:0786-1
- SUSE-SU-2018:0834-1
- SUSE-SU-2018:0848-1
- SUSE-SU-2018:0988-1
- SUSE-SU-2018:0989-1
- SUSE-SU-2018:0990-1
- SUSE-SU-2018:0992-1
- SUSE-SU-2018:0993-1
- SUSE-SU-2018:0994-1
- SUSE-SU-2018:0995-1
- SUSE-SU-2018:0996-1
- SUSE-SU-2018:0997-1
- SUSE-SU-2018:0998-1
- SUSE-SU-2018:0999-1
- SUSE-SU-2018:1000-1
- SUSE-SU-2018:1001-1
- SUSE-SU-2018:1002-1
- SUSE-SU-2018:1003-1
- SUSE-SU-2018:1004-1
- SUSE-SU-2018:1005-1
- SUSE-SU-2018:1006-1
- SUSE-SU-2018:1007-1
- SUSE-SU-2018:1008-1
- SUSE-SU-2018:1009-1
- SUSE-SU-2018:1010-1
- SUSE-SU-2018:1011-1
- SUSE-SU-2018:1012-1
- SUSE-SU-2018:1013-1
- SUSE-SU-2018:1014-1
- SUSE-SU-2018:1015-1
- SUSE-SU-2018:1016-1
- SUSE-SU-2018:1018-1
- SUSE-SU-2018:1019-1
- SUSE-SU-2018:1020-1
- SUSE-SU-2018:1021-1
- SUSE-SU-2018:1022-1
- SUSE-SU-2018:1023-1
- SUSE-SU-2018:1024-1
- SUSE-SU-2018:1025-1
- SUSE-SU-2018:1026-1
- SUSE-SU-2018:1027-1
- SUSE-SU-2018:1028-1
- SUSE-SU-2018:1029-1
- SUSE-SU-2018:1030-1
- SUSE-SU-2018:1031-1
- SUSE-SU-2018:1032-1
- SUSE-SU-2018:1033-1
- SUSE-SU-2018:1034-1
- SUSE-SU-2018:1173-1
- SUSE-SU-2018:1173-2
- SUSE-SU-2018:1220-1
- SUSE-SU-2018:1221-1
- SUSE-SU-2018:1366-1
- SUSE-SU-2018:1505-1
- SUSE-SU-2018:1506-1
- SUSE-SU-2018:1509-1
- SUSE-SU-2018:1510-1
- SUSE-SU-2018:1511-1
- SUSE-SU-2018:1512-1
- SUSE-SU-2018:1513-1
- SUSE-SU-2018:1514-1
- SUSE-SU-2018:1516-1
- SUSE-SU-2018:1517-1
- SUSE-SU-2018:1518-1
- SUSE-SU-2018:1519-1
- SUSE-SU-2018:1520-1
- SUSE-SU-2018:1521-1
- SUSE-SU-2018:1522-1
- SUSE-SU-2018:1523-1
- SUSE-SU-2018:1524-1
- SUSE-SU-2018:1526-1
- SUSE-SU-2018:1528-1
- SUSE-SU-2018:1529-1
- SUSE-SU-2018:1530-1
- SUSE-SU-2018:1531-1
- SUSE-SU-2018:1532-1
- SUSE-SU-2018:1533-1
- SUSE-SU-2018:1534-1
- SUSE-SU-2018:1535-1
- SUSE-SU-2018:1536-1
- SUSE-SU-2018:1537-1
- SUSE-SU-2018:1538-1
- SUSE-SU-2018:1539-1
- SUSE-SU-2018:1540-1
- SUSE-SU-2018:1541-1
- SUSE-SU-2018:1543-1
- SUSE-SU-2018:1545-1
- SUSE-SU-2018:1546-1
- SUSE-SU-2018:1548-1
- SUSE-SU-2018:1549-1
- SUSE-SU-2018:1636-1
- SUSE-SU-2018:1637-1
- SUSE-SU-2018:1639-1
- SUSE-SU-2018:1640-1
- SUSE-SU-2018:1641-1
- SUSE-SU-2018:1642-1
- SUSE-SU-2018:1643-1
- SUSE-SU-2018:1644-1
- SUSE-SU-2018:1645-1
- SUSE-SU-2018:1648-1
- SUSE-SU-2018:1761-1
- SUSE-SU-2018:1762-1
- SUSE-SU-2018:1816-1
- SUSE-SU-2018:1855-1
- SUSE-SU-2018:1855-2
- SUSE-SU-2018:2092-1
- SUSE-SU-2018:2332-1
- SUSE-SU-2018:2366-1
- SUSE-SU-2018:2637-1
- USN-3619-1
- USN-3619-2
- USN-3654-1
- USN-3654-2
- USN-3656-1
- USN-3674-2
- USN-3677-1
- USN-3677-2
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-extra-3.13.0-151-generic?distro=trusty | ubuntu | linux-image-extra-3.13.0-151-generic | < 3.13.0-151.201 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-151-powerpc64-smp?distro=trusty | ubuntu | linux-image-3.13.0-151-powerpc64-smp | < 3.13.0-151.201 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-151-powerpc64-emb?distro=trusty | ubuntu | linux-image-3.13.0-151-powerpc64-emb | < 3.13.0-151.201 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-151-powerpc-smp?distro=trusty | ubuntu | linux-image-3.13.0-151-powerpc-smp | < 3.13.0-151.201 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-151-powerpc-e500mc?distro=trusty | ubuntu | linux-image-3.13.0-151-powerpc-e500mc | < 3.13.0-151.201 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-151-powerpc-e500?distro=trusty | ubuntu | linux-image-3.13.0-151-powerpc-e500 | < 3.13.0-151.201 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-151-lowlatency?distro=trusty | ubuntu | linux-image-3.13.0-151-lowlatency | < 3.13.0-151.201 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-151-generic?distro=trusty | ubuntu | linux-image-3.13.0-151-generic | < 3.13.0-151.201 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-151-generic-lpae?distro=trusty | ubuntu | linux-image-3.13.0-151-generic-lpae | < 3.13.0-151.201 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |