Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2018-11508

Published: 28 May 2018

The compat_get_timex function in kernel/compat.c in the Linux kernel before 4.16.9 allows local users to obtain sensitive information from kernel memory via adjtimex.

From the Ubuntu Security Team

Jann Horn discovered that the 32 bit adjtimex() syscall implementation for 64 bit Linux kernels did not properly initialize memory returned to user space in some situations. A local attacker could use this to expose sensitive information (kernel memory).

Priority

Low

Cvss 3 Severity Score

5.5

Score breakdown

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
bionic
Released (4.15.0-24.26)
upstream
Released (4.17~rc5)
artful
Released (4.13.0-46.51)
cosmic Not vulnerable
(4.15.0-29.31)
trusty Not vulnerable

xenial Not vulnerable

Patches:
Introduced by

3a4d44b6162555070194e486ff6b3799a8d323a2

Fixed by 0a0b98734479aa5b3c671d5190e86273372cab95
linux-aws
Launchpad, Ubuntu, Debian
bionic
Released (4.15.0-1011.11)
upstream
Released (4.17~rc5)
artful Does not exist

cosmic Not vulnerable
(4.15.0-1011.11)
trusty Not vulnerable

xenial Not vulnerable

linux-azure
Launchpad, Ubuntu, Debian
bionic
Released (4.15.0-1014.14)
upstream
Released (4.17~rc5)
artful Does not exist

cosmic Not vulnerable
(4.15.0-1014.14)
trusty Not vulnerable
(4.15.0-1023.24~14.04.1)
xenial
Released (4.15.0-1014.14~16.04.1)
linux-azure-edge
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(4.18.0-1003.3~18.04.1)
upstream
Released (4.17~rc5)
artful Does not exist

cosmic Does not exist

trusty Does not exist

xenial
Released (4.15.0-1014.14)
linux-euclid
Launchpad, Ubuntu, Debian
bionic Does not exist

upstream
Released (4.17~rc5)
artful Does not exist

cosmic Does not exist

trusty Does not exist

xenial Not vulnerable

linux-flo
Launchpad, Ubuntu, Debian
bionic Does not exist

upstream
Released (4.17~rc5)
artful Does not exist

cosmic Does not exist

trusty Does not exist
(trusty was ignored [abandoned])
xenial Ignored
(abandoned)
linux-gcp
Launchpad, Ubuntu, Debian
bionic
Released (4.15.0-1010.10)
upstream
Released (4.17~rc5)
artful Does not exist

cosmic Not vulnerable
(4.15.0-1010.10)
trusty Does not exist

xenial
Released (4.15.0-1014.14~16.04.1)
linux-gke
Launchpad, Ubuntu, Debian
bionic Does not exist

upstream
Released (4.17~rc5)
artful Does not exist

cosmic Does not exist

trusty Does not exist

xenial Ignored
(end of standard support, was needs-triage)
linux-goldfish
Launchpad, Ubuntu, Debian
bionic Does not exist

upstream
Released (4.17~rc5)
artful Does not exist

cosmic Does not exist

trusty Does not exist
(trusty was ignored [abandoned])
xenial Ignored
(end of life, was needs-triage)
linux-grouper
Launchpad, Ubuntu, Debian
bionic Does not exist

upstream
Released (4.17~rc5)
artful Does not exist

cosmic Does not exist

trusty Does not exist
(trusty was ignored [abandoned])
xenial Does not exist

linux-hwe
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Not vulnerable

cosmic Does not exist

trusty Does not exist

upstream
Released (4.17~rc5)
xenial
Released (4.15.0-24.26~16.04.1)
linux-hwe-edge
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Not vulnerable
(4.18.0-8.9~18.04.1)
cosmic Does not exist

trusty Does not exist

upstream
Released (4.17~rc5)
xenial
Released (4.15.0-24.26~16.04.1)
linux-kvm
Launchpad, Ubuntu, Debian
artful Does not exist

bionic
Released (4.15.0-1012.12)
cosmic Not vulnerable
(4.15.0-1012.12)
trusty Does not exist

upstream
Released (4.17~rc5)
xenial Not vulnerable

linux-lts-trusty
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

cosmic Does not exist

trusty Does not exist

upstream
Released (4.17~rc5)
xenial Does not exist

linux-lts-utopic
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

cosmic Does not exist

trusty Does not exist
(trusty was ignored [end of standard support])
upstream
Released (4.17~rc5)
xenial Does not exist

linux-lts-vivid
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

cosmic Does not exist

trusty Does not exist
(trusty was ignored [end of standard support])
upstream
Released (4.17~rc5)
xenial Does not exist

linux-lts-wily
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

cosmic Does not exist

trusty Does not exist
(trusty was ignored [end of standard support])
upstream
Released (4.17~rc5)
xenial Does not exist

linux-lts-xenial
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

cosmic Does not exist

trusty Not vulnerable

upstream
Released (4.17~rc5)
xenial Does not exist

linux-maguro
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

cosmic Does not exist

trusty Does not exist
(trusty was ignored [abandoned])
upstream
Released (4.17~rc5)
xenial Does not exist

linux-mako
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

cosmic Does not exist

trusty Does not exist
(trusty was ignored [abandoned])
upstream
Released (4.17~rc5)
xenial Ignored
(abandoned)
linux-manta
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

cosmic Does not exist

trusty Does not exist
(trusty was ignored [abandoned])
upstream
Released (4.17~rc5)
xenial Does not exist

linux-oem
Launchpad, Ubuntu, Debian
artful Does not exist

bionic
Released (4.15.0-1009.12)
cosmic Not vulnerable
(4.15.0-1009.12)
trusty Does not exist

upstream
Released (4.17~rc5)
xenial
Released (4.13.0-1031.35)
linux-raspi2
Launchpad, Ubuntu, Debian
artful
Released (4.13.0-1023.24)
bionic
Released (4.15.0-1013.14)
cosmic Not vulnerable
(4.15.0-1021.23)
trusty Does not exist

upstream
Released (4.17~rc5)
xenial Not vulnerable

linux-snapdragon
Launchpad, Ubuntu, Debian
artful Not vulnerable

bionic Not vulnerable

cosmic Does not exist

trusty Does not exist

upstream
Released (4.17~rc5)
xenial Not vulnerable

Severity score breakdown

Parameter Value
Base score 5.5
Attack vector Local
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact None
Availability impact None
Vector CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N