[USN-3741-1] Linux kernel vulnerabilities

Severity High
Affected Packages 12
CVEs 4

Several security issues were fixed in the Linux kernel.

It was discovered that memory present in the L1 data cache of an Intel CPU
core may be exposed to a malicious process that is executing on the CPU
core. This vulnerability is also known as L1 Terminal Fault (L1TF). A local
attacker in a guest virtual machine could use this to expose sensitive
information (memory from other guests or the host OS). (CVE-2018-3646)

It was discovered that memory present in the L1 data cache of an Intel CPU
core may be exposed to a malicious process that is executing on the CPU
core. This vulnerability is also known as L1 Terminal Fault (L1TF). A local
attacker could use this to expose sensitive information (memory from the
kernel or other processes). (CVE-2018-3620)

Juha-Matti Tilli discovered that the TCP implementation in the Linux kernel
performed algorithmically expensive operations in some situations when
handling incoming packets. A remote attacker could use this to cause a
denial of service. (CVE-2018-5390)

Juha-Matti Tilli discovered that the IP implementation in the Linux kernel
performed algorithmically expensive operations in some situations when
handling incoming packet fragments. A remote attacker could use this to
cause a denial of service. (CVE-2018-5391)

ID
USN-3741-1
Severity
high
URL
https://ubuntu.com/security/notices/USN-3741-1
Published
2018-08-14T21:49:23
(6 years ago)
Modified
2018-08-14T21:49:23
(6 years ago)
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:deb/ubuntu/linux-image-extra-4.4.0-133-generic?distro=xenial ubuntu linux-image-extra-4.4.0-133-generic < 4.4.0-133.159 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-133-powerpc64-smp?distro=xenial ubuntu linux-image-4.4.0-133-powerpc64-smp < 4.4.0-133.159 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-133-powerpc64-emb?distro=xenial ubuntu linux-image-4.4.0-133-powerpc64-emb < 4.4.0-133.159 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-133-powerpc-smp?distro=xenial ubuntu linux-image-4.4.0-133-powerpc-smp < 4.4.0-133.159 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-133-powerpc-e500mc?distro=xenial ubuntu linux-image-4.4.0-133-powerpc-e500mc < 4.4.0-133.159 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-133-lowlatency?distro=xenial ubuntu linux-image-4.4.0-133-lowlatency < 4.4.0-133.159 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-133-generic?distro=xenial ubuntu linux-image-4.4.0-133-generic < 4.4.0-133.159 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-133-generic-lpae?distro=xenial ubuntu linux-image-4.4.0-133-generic-lpae < 4.4.0-133.159 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-1098-snapdragon?distro=xenial ubuntu linux-image-4.4.0-1098-snapdragon < 4.4.0-1098.103 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-1094-raspi2?distro=xenial ubuntu linux-image-4.4.0-1094-raspi2 < 4.4.0-1094.102 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-1065-aws?distro=xenial ubuntu linux-image-4.4.0-1065-aws < 4.4.0-1065.75 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-1031-kvm?distro=xenial ubuntu linux-image-4.4.0-1031-kvm < 4.4.0-1031.37 xenial
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...