First published: Wed Mar 06 2019(Updated: )
USN-3903-1 fixed vulnerabilities in the Linux kernel for Ubuntu 18.10. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 18.10 for Ubuntu 18.04 LTS. Jason Wang discovered that the vhost net driver in the Linux kernel contained an out of bounds write vulnerability. An attacker in a guest virtual machine could use this to cause a denial of service (host system crash) or possibly execute arbitrary code in the host kernel. (CVE-2018-16880) Jann Horn discovered that the userfaultd implementation in the Linux kernel did not properly restrict access to certain ioctls. A local attacker could use this possibly to modify files. (CVE-2018-18397) Jann Horn discovered a race condition in the fork() system call in the Linux kernel. A local attacker could use this to gain access to services that cache authorizations. (CVE-2019-6133)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.18.0-1013-azure | <4.18.0-1013.13~18.04.1 | 4.18.0-1013.13~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.18.0-16-generic | <4.18.0-16.17~18.04.1 | 4.18.0-16.17~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.18.0-16-generic-lpae | <4.18.0-16.17~18.04.1 | 4.18.0-16.17~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.18.0-16-lowlatency | <4.18.0-16.17~18.04.1 | 4.18.0-16.17~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.18.0-16-snapdragon | <4.18.0-16.17~18.04.1 | 4.18.0-16.17~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-azure | <4.18.0.1013.12 | 4.18.0.1013.12 |
=18.04 | ||
All of | ||
ubuntu/linux-image-generic-hwe-18.04 | <4.18.0.16.66 | 4.18.0.16.66 |
=18.04 | ||
All of | ||
ubuntu/linux-image-generic-lpae-hwe-18.04 | <4.18.0.16.66 | 4.18.0.16.66 |
=18.04 | ||
All of | ||
ubuntu/linux-image-lowlatency-hwe-18.04 | <4.18.0.16.66 | 4.18.0.16.66 |
=18.04 | ||
All of | ||
ubuntu/linux-image-snapdragon-hwe-18.04 | <4.18.0.16.66 | 4.18.0.16.66 |
=18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-3903-2 is not specified in the information provided.
To fix USN-3903-2, you should update the Linux kernel to the recommended version provided in the Ubuntu security advisory.
The vulnerability IDs associated with USN-3903-2 are CVE-2018-16880, CVE-2018-18397, and CVE-2019-6133.
Yes, Ubuntu 18.04 LTS is affected by USN-3903-2.
You can find more information about USN-3903-2 on the Ubuntu security advisory page provided in the references section.