Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2018-1118

Published: 10 May 2018

Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.

From the Ubuntu Security Team

It was discovered that the VirtIO subsystem in the Linux kernel did not properly initialize memory in some situations. A local attacker could use this to possibly expose sensitive information (kernel memory).

Priority

Low

Cvss 3 Severity Score

5.5

Score breakdown

Status

Package Release Status
linux-azure
Launchpad, Ubuntu, Debian
bionic
Released (4.15.0-1023.24)
upstream
Released (4.18~rc1)
artful Does not exist

cosmic Not vulnerable
(4.18.0-1003.3)
trusty Not vulnerable
(4.15.0-1023.24~14.04.1)
xenial
Released (4.15.0-1023.24~16.04.1)
linux-azure-edge
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(4.18.0-1003.3~18.04.1)
upstream
Released (4.18~rc1)
cosmic Does not exist

trusty Does not exist

xenial
Released (4.15.0-1023.24)
linux-euclid
Launchpad, Ubuntu, Debian
bionic Does not exist

upstream
Released (4.18~rc1)
artful Does not exist

cosmic Does not exist

trusty Does not exist

xenial Not vulnerable

linux-gcp
Launchpad, Ubuntu, Debian
bionic
Released (4.15.0-1019.20)
upstream
Released (4.18~rc1)
artful Does not exist

cosmic Not vulnerable
(4.15.0-1019.20)
trusty Does not exist

xenial
Released (4.15.0-1019.20~16.04.1)
linux-gke
Launchpad, Ubuntu, Debian
bionic Does not exist

upstream
Released (4.18~rc1)
artful Does not exist

cosmic Does not exist

trusty Does not exist

xenial Ignored
(end of standard support, was needs-triage)
linux-kvm
Launchpad, Ubuntu, Debian
bionic
Released (4.15.0-1021.21)
upstream
Released (4.18~rc1)
artful Does not exist

cosmic Not vulnerable
(4.15.0-1021.21)
trusty Does not exist

xenial Not vulnerable

linux-oem
Launchpad, Ubuntu, Debian
bionic
Released (4.15.0-1018.21)
upstream
Released (4.18~rc1)
artful Does not exist

cosmic Not vulnerable
(4.15.0-1018.21)
trusty Does not exist

xenial Ignored
(end of standard support, was needed)
linux
Launchpad, Ubuntu, Debian
trusty Not vulnerable

artful Ignored
(end of life)
bionic
Released (4.15.0-34.37)
cosmic Not vulnerable
(4.17.0-6.7)
upstream
Released (4.18~rc1)
xenial Not vulnerable

Patches:
Introduced by

6b1e6cc7855b09a0a9bfa1d9f30172ba366f161c

Fixed by 670ae9caaca467ea1bfd325cb2a5c98ba87f94ad
linux-aws
Launchpad, Ubuntu, Debian
artful Does not exist

bionic
Released (4.15.0-1021.21)
cosmic Not vulnerable
(4.15.0-1021.21)
trusty Not vulnerable

upstream
Released (4.18~rc1)
xenial Not vulnerable

linux-flo
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

cosmic Does not exist

trusty Does not exist
(trusty was ignored [abandoned])
upstream
Released (4.18~rc1)
xenial Ignored
(abandoned)
linux-goldfish
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

cosmic Does not exist

trusty Does not exist
(trusty was ignored [abandoned])
upstream
Released (4.18~rc1)
xenial Ignored
(end of life, was needs-triage)
linux-grouper
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

cosmic Does not exist

trusty Does not exist
(trusty was ignored [abandoned])
upstream
Released (4.18~rc1)
xenial Does not exist

linux-hwe
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Not vulnerable

cosmic Does not exist

trusty Does not exist

upstream
Released (4.18~rc1)
xenial
Released (4.15.0-34.37~16.04.1)
linux-hwe-edge
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Not vulnerable
(4.18.0-11.12~18.04.1)
cosmic Does not exist

trusty Does not exist

upstream
Released (4.18~rc1)
xenial
Released (4.15.0-34.37~16.04.1)
linux-lts-trusty
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

cosmic Does not exist

trusty Does not exist

upstream
Released (4.18~rc1)
xenial Does not exist

linux-lts-utopic
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

cosmic Does not exist

trusty Does not exist
(trusty was ignored [end of standard support])
upstream
Released (4.18~rc1)
xenial Does not exist

linux-lts-vivid
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

cosmic Does not exist

trusty Does not exist
(trusty was ignored [end of standard support])
upstream
Released (4.18~rc1)
xenial Does not exist

linux-lts-wily
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

cosmic Does not exist

trusty Does not exist
(trusty was ignored [end of standard support])
upstream
Released (4.18~rc1)
xenial Does not exist

linux-lts-xenial
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

cosmic Does not exist

trusty Not vulnerable

upstream
Released (4.18~rc1)
xenial Does not exist

linux-maguro
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

cosmic Does not exist

trusty Does not exist
(trusty was ignored [abandoned])
upstream
Released (4.18~rc1)
xenial Does not exist

linux-mako
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

cosmic Does not exist

trusty Does not exist
(trusty was ignored [abandoned])
upstream
Released (4.18~rc1)
xenial Ignored
(abandoned)
linux-manta
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

cosmic Does not exist

trusty Does not exist
(trusty was ignored [abandoned])
upstream
Released (4.18~rc1)
xenial Does not exist

linux-raspi2
Launchpad, Ubuntu, Debian
artful Ignored
(end of life)
bionic
Released (4.15.0-1022.24)
cosmic Not vulnerable
(4.15.0-1022.24)
trusty Does not exist

upstream
Released (4.18~rc1)
xenial Not vulnerable

linux-snapdragon
Launchpad, Ubuntu, Debian
artful Not vulnerable

bionic Not vulnerable

cosmic Does not exist

trusty Does not exist

upstream
Released (4.18~rc1)
xenial Not vulnerable

Severity score breakdown

Parameter Value
Base score 5.5
Attack vector Local
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact None
Availability impact None
Vector CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N