First published: Tue Mar 05 2019(Updated: )
Jann Horn discovered that the userfaultd implementation in the Linux kernel did not properly restrict access to certain ioctls. A local attacker could use this possibly to modify files. (CVE-2018-18397) It was discovered that the crypto subsystem of the Linux kernel leaked uninitialized memory to user space in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2018-19854) Jann Horn discovered a race condition in the fork() system call in the Linux kernel. A local attacker could use this to gain access to services that cache authorizations. (CVE-2019-6133)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.15.0-1009-oracle | <4.15.0-1009.11 | 4.15.0-1009.11 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-4.15.0-1028-gcp | <4.15.0-1028.29 | 4.15.0-1028.29 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-4.15.0-1030-kvm | <4.15.0-1030.30 | 4.15.0-1030.30 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-4.15.0-1032-raspi2 | <4.15.0-1032.34 | 4.15.0-1032.34 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-4.15.0-1033-aws | <4.15.0-1033.35 | 4.15.0-1033.35 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-4.15.0-1034-oem | <4.15.0-1034.39 | 4.15.0-1034.39 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-4.15.0-46-generic | <4.15.0-46.49 | 4.15.0-46.49 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-4.15.0-46-generic-lpae | <4.15.0-46.49 | 4.15.0-46.49 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-4.15.0-46-lowlatency | <4.15.0-46.49 | 4.15.0-46.49 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-4.15.0-46-snapdragon | <4.15.0-46.49 | 4.15.0-46.49 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-aws | <4.15.0.1033.32 | 4.15.0.1033.32 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-gcp | <4.15.0.1028.30 | 4.15.0.1028.30 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-generic | <4.15.0.46.48 | 4.15.0.46.48 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-generic-lpae | <4.15.0.46.48 | 4.15.0.46.48 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-gke | <4.15.0.1028.30 | 4.15.0.1028.30 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-kvm | <4.15.0.1030.30 | 4.15.0.1030.30 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-lowlatency | <4.15.0.46.48 | 4.15.0.46.48 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-oem | <4.15.0.1034.39 | 4.15.0.1034.39 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-oracle | <4.15.0.1009.12 | 4.15.0.1009.12 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-raspi2 | <4.15.0.1032.30 | 4.15.0.1032.30 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-snapdragon | <4.15.0.46.48 | 4.15.0.46.48 |
Ubuntu Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for this advisory is CVE-2018-18397.
The vulnerability in the Linux kernel allows a local attacker to possibly modify files.
This vulnerability affects Ubuntu 18.04.
The remedy for this vulnerability is to install the specific kernel version mentioned in the advisory.
You can find more information about this vulnerability at the following link: [link](https://ubuntu.com/security/CVE-2018-18397).