vulnerability

Ubuntu: (Multiple Advisories) (CVE-2017-13695): Linux kernel vulnerabilities

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
Aug 25, 2017
Added
Jul 5, 2018
Modified
Apr 25, 2025

Description

It was discovered that an integer overflow existed in the perf subsystem of
the Linux kernel. A local attacker could use this to cause a denial of
service (system crash). (CVE-2017-18255)

Wei Fang discovered an integer overflow in the F2FS filesystem
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service. (CVE-2017-18257)

It was discovered that an information leak existed in the generic SCSI
driver in the Linux kernel. A local attacker could use this to expose
sensitive information (kernel memory). (CVE-2018-1000204)

It was discovered that the wait4() system call in the Linux kernel did not
properly validate its arguments in some situations. A local attacker could
possibly use this to cause a denial of service. (CVE-2018-10087)

It was discovered that the kill() system call implementation in the Linux
kernel did not properly validate its arguments in some situations. A local
attacker could possibly use this to cause a denial of service.
(CVE-2018-10124)

Julian Stecklina and Thomas Prescher discovered that FPU register states
(such as MMX, SSE, and AVX registers) which are lazily restored are
potentially vulnerable to a side channel attack. A local attacker could use
this to expose sensitive information. (CVE-2018-3665)

Jakub Jirasek discovered that multiple use-after-free errors existed in the
USB/IP implementation in the Linux kernel. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2018-5814)

It was discovered that an information leak vulnerability existed in the
floppy driver in the Linux kernel. A local attacker could use this to
expose sensitive information (kernel memory). (CVE-2018-7755)

Seunghun Han discovered an information leak in the ACPI handling code in
the Linux kernel when handling early termination of ACPI table loading. A
local attacker could use this to expose sensitive informal (kernel address
locations). (CVE-2017-13695)

It was discovered that a memory leak existed in the Serial Attached SCSI
(SAS) implementation in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (memory exhaustion).
(CVE-2018-10021)

Solution(s)

ubuntu-upgrade-linux-image-4-15-0-1019-gcpubuntu-upgrade-linux-image-4-15-0-1021-awsubuntu-upgrade-linux-image-4-15-0-1021-kvmubuntu-upgrade-linux-image-4-15-0-1022-raspi2ubuntu-upgrade-linux-image-4-15-0-1023-azureubuntu-upgrade-linux-image-4-15-0-34-genericubuntu-upgrade-linux-image-4-15-0-34-generic-lpaeubuntu-upgrade-linux-image-4-15-0-34-lowlatencyubuntu-upgrade-linux-image-4-15-0-34-snapdragonubuntu-upgrade-linux-image-4-4-0-1024-awsubuntu-upgrade-linux-image-4-4-0-1029-kvmubuntu-upgrade-linux-image-4-4-0-1062-awsubuntu-upgrade-linux-image-4-4-0-1092-raspi2ubuntu-upgrade-linux-image-4-4-0-1095-snapdragonubuntu-upgrade-linux-image-4-4-0-130-genericubuntu-upgrade-linux-image-4-4-0-130-generic-lpaeubuntu-upgrade-linux-image-4-4-0-130-lowlatencyubuntu-upgrade-linux-image-4-4-0-130-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-130-powerpc-smpubuntu-upgrade-linux-image-4-4-0-130-powerpc64-embubuntu-upgrade-linux-image-4-4-0-130-powerpc64-smpubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-edgeubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragon
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.