[USN-3762-1] Linux kernel vulnerabilities
Severity
Low
Affected Packages
11
CVEs
2
Several security issues were fixed in the Linux kernel.
It was discovered that the VirtIO subsystem in the Linux kernel did not
properly initialize memory in some situations. A local attacker could use
this to possibly expose sensitive information (kernel memory).
(CVE-2018-1118)
Seunghun Han discovered an information leak in the ACPI handling code in
the Linux kernel when handling early termination of ACPI table loading. A
local attacker could use this to expose sensitive informal (kernel address
locations). (CVE-2017-13695)
Package | Affected Version |
---|---|
pkg:deb/ubuntu/linux-image-unsigned-4.15.0-34-lowlatency?distro=bionic | < 4.15.0-34.37 |
pkg:deb/ubuntu/linux-image-unsigned-4.15.0-34-generic?distro=bionic | < 4.15.0-34.37 |
pkg:deb/ubuntu/linux-image-unsigned-4.15.0-1023-azure?distro=bionic | < 4.15.0-1023.24 |
pkg:deb/ubuntu/linux-image-unsigned-4.15.0-1019-gcp?distro=bionic | < 4.15.0-1019.20 |
pkg:deb/ubuntu/linux-image-4.15.0-34-snapdragon?distro=bionic | < 4.15.0-34.37 |
pkg:deb/ubuntu/linux-image-4.15.0-34-lowlatency?distro=bionic | < 4.15.0-34.37 |
pkg:deb/ubuntu/linux-image-4.15.0-34-generic?distro=bionic | < 4.15.0-34.37 |
pkg:deb/ubuntu/linux-image-4.15.0-34-generic-lpae?distro=bionic | < 4.15.0-34.37 |
pkg:deb/ubuntu/linux-image-4.15.0-1022-raspi2?distro=bionic | < 4.15.0-1022.24 |
pkg:deb/ubuntu/linux-image-4.15.0-1021-kvm?distro=bionic | < 4.15.0-1021.21 |
pkg:deb/ubuntu/linux-image-4.15.0-1021-aws?distro=bionic | < 4.15.0-1021.21 |
- ID
- USN-3762-1
- Severity
- low
- URL
- https://ubuntu.com/security/notices/USN-3762-1
- Published
-
2018-09-11T02:06:31
(6 years ago) - Modified
-
2018-09-11T02:06:31
(6 years ago) - Other Advisories
-
- ELSA-2018-3083
- ELSA-2018-4227
- ELSA-2018-4242
- ELSA-2018-4245
- ELSA-2018-4246
- ELSA-2018-4250
- FEDORA-2017-6764d16965
- FEDORA-2017-a3a8638a60
- FEDORA-2018-4ca01704a2
- FEDORA-2018-6367a17aa3
- FEDORA-2018-7c2e0a998d
- FEDORA-2018-884a105c04
- FEDORA-2018-8d90571cdf
- RHSA-2018:3083
- RHSA-2018:3096
- SUSE-SU-2018:2092-1
- SUSE-SU-2018:2222-1
- SUSE-SU-2022:2077-1
- SUSE-SU-2022:2082-1
- SUSE-SU-2022:2103-1
- SUSE-SU-2022:2111-1
- SUSE-SU-2023:0416-1
- USN-3696-1
- USN-3696-2
- USN-3762-2
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-unsigned-4.15.0-34-lowlatency?distro=bionic | ubuntu | linux-image-unsigned-4.15.0-34-lowlatency | < 4.15.0-34.37 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-unsigned-4.15.0-34-generic?distro=bionic | ubuntu | linux-image-unsigned-4.15.0-34-generic | < 4.15.0-34.37 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-unsigned-4.15.0-1023-azure?distro=bionic | ubuntu | linux-image-unsigned-4.15.0-1023-azure | < 4.15.0-1023.24 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-unsigned-4.15.0-1019-gcp?distro=bionic | ubuntu | linux-image-unsigned-4.15.0-1019-gcp | < 4.15.0-1019.20 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-34-snapdragon?distro=bionic | ubuntu | linux-image-4.15.0-34-snapdragon | < 4.15.0-34.37 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-34-lowlatency?distro=bionic | ubuntu | linux-image-4.15.0-34-lowlatency | < 4.15.0-34.37 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-34-generic?distro=bionic | ubuntu | linux-image-4.15.0-34-generic | < 4.15.0-34.37 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-34-generic-lpae?distro=bionic | ubuntu | linux-image-4.15.0-34-generic-lpae | < 4.15.0-34.37 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1022-raspi2?distro=bionic | ubuntu | linux-image-4.15.0-1022-raspi2 | < 4.15.0-1022.24 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1021-kvm?distro=bionic | ubuntu | linux-image-4.15.0-1021-kvm | < 4.15.0-1021.21 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1021-aws?distro=bionic | ubuntu | linux-image-4.15.0-1021-aws | < 4.15.0-1021.21 | bionic |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |