First published: Tue May 08 2018(Updated: )
Nick Peterson discovered that the Linux kernel did not properly handle debug exceptions following a MOV/POP to SS instruction. A local attacker could use this to cause a denial of service (system crash). This issue only affected the amd64 architecture. (CVE-2018-8897) Andy Lutomirski discovered that the KVM subsystem of the Linux kernel did not properly emulate the ICEBP instruction following a MOV/POP to SS instruction. A local attacker in a KVM virtual machine could use this to cause a denial of service (guest VM crash) or possibly escalate privileges inside of the virtual machine. This issue only affected the i386 and amd64 architectures. (CVE-2018-1087) Andy Lutomirski discovered that the Linux kernel did not properly perform error handling on virtualized debug registers. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-1000199)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.13.0-1019-raspi2 | <4.13.0-1019.20 | 4.13.0-1019.20 |
Ubuntu OpenSSH Client | =17.10 | |
All of | ||
ubuntu/linux-image-4.13.0-41-generic | <4.13.0-41.46 | 4.13.0-41.46 |
Ubuntu OpenSSH Client | =17.10 | |
All of | ||
ubuntu/linux-image-4.13.0-41-generic-lpae | <4.13.0-41.46 | 4.13.0-41.46 |
Ubuntu OpenSSH Client | =17.10 | |
All of | ||
ubuntu/linux-image-4.13.0-41-lowlatency | <4.13.0-41.46 | 4.13.0-41.46 |
Ubuntu OpenSSH Client | =17.10 | |
All of | ||
ubuntu/linux-image-generic | <4.13.0.41.44 | 4.13.0.41.44 |
Ubuntu OpenSSH Client | =17.10 | |
All of | ||
ubuntu/linux-image-generic-lpae | <4.13.0.41.44 | 4.13.0.41.44 |
Ubuntu OpenSSH Client | =17.10 | |
All of | ||
ubuntu/linux-image-lowlatency | <4.13.0.41.44 | 4.13.0.41.44 |
Ubuntu OpenSSH Client | =17.10 | |
All of | ||
ubuntu/linux-image-raspi2 | <4.13.0.1019.17 | 4.13.0.1019.17 |
Ubuntu OpenSSH Client | =17.10 | |
All of | ||
ubuntu/linux-image-4.13.0-1015-gcp | <4.13.0-1015.19 | 4.13.0-1015.19 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-4.13.0-1016-azure | <4.13.0-1016.19 | 4.13.0-1016.19 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-4.13.0-1026-oem | <4.13.0-1026.29 | 4.13.0-1026.29 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-4.13.0-41-generic | <4.13.0-41.46~16.04.1 | 4.13.0-41.46~16.04.1 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-4.13.0-41-generic-lpae | <4.13.0-41.46~16.04.1 | 4.13.0-41.46~16.04.1 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-4.13.0-41-lowlatency | <4.13.0-41.46~16.04.1 | 4.13.0-41.46~16.04.1 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-1023-kvm | <4.4.0-1023.28 | 4.4.0-1023.28 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-1057-aws | <4.4.0-1057.66 | 4.4.0-1057.66 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-1089-raspi2 | <4.4.0-1089.97 | 4.4.0-1089.97 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-1092-snapdragon | <4.4.0-1092.97 | 4.4.0-1092.97 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-124-generic | <4.4.0-124.148 | 4.4.0-124.148 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-124-generic-lpae | <4.4.0-124.148 | 4.4.0-124.148 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-124-lowlatency | <4.4.0-124.148 | 4.4.0-124.148 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-124-powerpc-e500mc | <4.4.0-124.148 | 4.4.0-124.148 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-124-powerpc-smp | <4.4.0-124.148 | 4.4.0-124.148 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-124-powerpc64-emb | <4.4.0-124.148 | 4.4.0-124.148 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-124-powerpc64-smp | <4.4.0-124.148 | 4.4.0-124.148 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-9027-euclid | <4.4.0-9027.29 | 4.4.0-9027.29 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-3.13.0-147-generic | <3.13.0-147.196 | 3.13.0-147.196 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/linux-image-3.13.0-147-generic-lpae | <3.13.0-147.196 | 3.13.0-147.196 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/linux-image-3.13.0-147-lowlatency | <3.13.0-147.196 | 3.13.0-147.196 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/linux-image-3.13.0-147-powerpc-e500 | <3.13.0-147.196 | 3.13.0-147.196 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/linux-image-3.13.0-147-powerpc-e500mc | <3.13.0-147.196 | 3.13.0-147.196 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/linux-image-3.13.0-147-powerpc-smp | <3.13.0-147.196 | 3.13.0-147.196 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/linux-image-3.13.0-147-powerpc64-emb | <3.13.0-147.196 | 3.13.0-147.196 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/linux-image-3.13.0-147-powerpc64-smp | <3.13.0-147.196 | 3.13.0-147.196 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/linux-image-4.4.0-1019-aws | <4.4.0-1019.19 | 4.4.0-1019.19 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/linux-image-4.4.0-124-generic | <4.4.0-124.148~14.04.1 | 4.4.0-124.148~14.04.1 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/linux-image-4.4.0-124-generic-lpae | <4.4.0-124.148~14.04.1 | 4.4.0-124.148~14.04.1 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/linux-image-4.4.0-124-lowlatency | <4.4.0-124.148~14.04.1 | 4.4.0-124.148~14.04.1 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/linux-image-4.4.0-124-powerpc-e500mc | <4.4.0-124.148~14.04.1 | 4.4.0-124.148~14.04.1 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/linux-image-4.4.0-124-powerpc-smp | <4.4.0-124.148~14.04.1 | 4.4.0-124.148~14.04.1 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/linux-image-4.4.0-124-powerpc64-emb | <4.4.0-124.148~14.04.1 | 4.4.0-124.148~14.04.1 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/linux-image-4.4.0-124-powerpc64-smp | <4.4.0-124.148~14.04.1 | 4.4.0-124.148~14.04.1 |
Ubuntu OpenSSH Client | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-3641-1 is considered high due to the potential for local attackers to cause a system crash.
To fix USN-3641-1, update your system to the latest version of the kernel identified in the advisory.
USN-3641-1 specifically affects the amd64 architecture.
USN-3641-1 affects Ubuntu 17.10 and several related Linux kernel images.
While USN-3641-1 primarily leads to denial of service, it may indirectly result in data loss if a system crash occurs during critical operations.