First published: Mon May 21 2018(Updated: )
kernel drivers before version 4.17-rc1 are vulnerable to a weakness in the Linux kernel's implementation of random seed data. Programs, early in the boot sequence, could use the data allocated for the seed before it was sufficiently generated.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=4.16 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Debian Debian Linux | =9.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.106-3 6.1.112-1 6.11.4-1 6.11.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this weakness is CVE-2018-1108.
This vulnerability occurs in kernel drivers before version 4.17-rc1 and is related to the Linux kernel's implementation of random seed data.
The vulnerability affects various versions of the Linux kernel, including Ubuntu packages linux, linux-goldfish, linux-grouper, linux-flo, linux-aws, linux-gke, linux-azure, linux-gcp, linux-euclid, linux-azure-edge, linux-hwe, linux-lts-trusty, linux-lts-utopic, linux-lts-vivid, linux-hwe-edge, linux-kvm, linux-lts-wily, linux-lts-xenial, linux-maguro, linux-mako, linux-manta, linux-oem, linux-raspi2, and linux-snapdragon.
To fix this vulnerability, update your Linux kernel to version 4.17 or higher.
You can find more information about this vulnerability in the references section of the advisory.