CVE-2018-16658
Published: 7 September 2018
An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940.
From the Ubuntu Security Team
It was discovered that an integer overflow existed in the CD-ROM driver of the Linux kernel. A local attacker could use this to expose sensitive information (kernel memory).
Priority
Status
Package | Release | Status |
---|---|---|
linux
Launchpad, Ubuntu, Debian |
bionic |
Released
(4.15.0-39.42)
|
cosmic |
Not vulnerable
(4.18.0-8.9)
|
|
trusty |
Released
(3.13.0-162.212)
|
|
upstream |
Released
(4.19~rc2)
|
|
xenial |
Released
(4.4.0-138.164)
|
|
Patches:
Introduced by
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
||
linux-aws
Launchpad, Ubuntu, Debian |
bionic |
Released
(4.15.0-1027.27)
|
cosmic |
Not vulnerable
(4.18.0-1002.3)
|
|
trusty |
Released
(4.4.0-1032.35)
|
|
upstream |
Released
(4.19~rc2)
|
|
xenial |
Released
(4.4.0-1070.80)
|
|
linux-azure
Launchpad, Ubuntu, Debian |
bionic |
Released
(4.15.0-1031.32)
|
cosmic |
Not vulnerable
(4.18.0-1003.3)
|
|
trusty |
Released
(4.15.0-1031.32~14.04.1)
|
|
upstream |
Released
(4.19~rc2)
|
|
xenial |
Released
(4.15.0-1031.32~16.04.1)
|
|
linux-azure-edge
Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(4.18.0-1006.6~18.04.1)
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc2)
|
|
xenial |
Released
(4.15.0-1031.32)
|
|
linux-euclid
Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc2)
|
|
xenial |
Ignored
(was needed ESM criteria)
|
|
linux-flo
Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
(trusty was ignored [abandoned])
|
|
upstream |
Released
(4.19~rc2)
|
|
xenial |
Ignored
(abandoned)
|
|
linux-gcp
Launchpad, Ubuntu, Debian |
bionic |
Released
(4.15.0-1024.25)
|
cosmic |
Not vulnerable
(4.18.0-1002.3)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc2)
|
|
xenial |
Released
(4.15.0-1024.25~16.04.2)
|
|
linux-gke
Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc2)
|
|
xenial |
Ignored
(end of standard support)
|
|
linux-goldfish
Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
(trusty was ignored [abandoned])
|
|
upstream |
Released
(4.19~rc2)
|
|
xenial |
Ignored
(end of life)
|
|
linux-grouper
Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
(trusty was ignored [abandoned])
|
|
upstream |
Released
(4.19~rc2)
|
|
xenial |
Does not exist
|
|
linux-hwe
Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(4.18.0-12.13~18.04.2)
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc2)
|
|
xenial |
Released
(4.15.0-39.42~16.04.1)
|
|
linux-hwe-edge
Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(4.18.0-12.13~18.04.2)
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc2)
|
|
xenial |
Released
(4.15.0-39.42~16.04.1)
|
|
linux-kvm
Launchpad, Ubuntu, Debian |
bionic |
Released
(4.15.0-1026.26)
|
cosmic |
Not vulnerable
(4.18.0-1002.2)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc2)
|
|
xenial |
Released
(4.4.0-1036.42)
|
|
linux-lts-trusty
Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc2)
|
|
xenial |
Does not exist
|
|
linux-lts-utopic
Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
(trusty was ignored [end of standard support])
|
|
upstream |
Released
(4.19~rc2)
|
|
xenial |
Does not exist
|
|
linux-lts-vivid
Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
(trusty was ignored [end of standard support])
|
|
upstream |
Released
(4.19~rc2)
|
|
xenial |
Does not exist
|
|
linux-lts-wily
Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
(trusty was ignored [end of standard support])
|
|
upstream |
Released
(4.19~rc2)
|
|
xenial |
Does not exist
|
|
linux-lts-xenial
Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Released
(4.4.0-138.164~14.04.1)
|
|
upstream |
Released
(4.19~rc2)
|
|
xenial |
Does not exist
|
|
linux-maguro
Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
(trusty was ignored [abandoned])
|
|
upstream |
Released
(4.19~rc2)
|
|
xenial |
Does not exist
|
|
linux-mako
Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
(trusty was ignored [abandoned])
|
|
upstream |
Released
(4.19~rc2)
|
|
xenial |
Ignored
(abandoned)
|
|
linux-manta
Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
(trusty was ignored [abandoned])
|
|
upstream |
Released
(4.19~rc2)
|
|
xenial |
Does not exist
|
|
linux-oem
Launchpad, Ubuntu, Debian |
bionic |
Released
(4.15.0-1026.31)
|
cosmic |
Released
(4.15.0-1026.31)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc2)
|
|
xenial |
Ignored
(end of standard support, was needed)
|
|
linux-raspi2
Launchpad, Ubuntu, Debian |
bionic |
Released
(4.15.0-1028.30)
|
cosmic |
Not vulnerable
(4.18.0-1004.6)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc2)
|
|
xenial |
Released
(4.4.0-1099.107)
|
|
linux-snapdragon
Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc2)
|
|
xenial |
Released
(4.4.0-1103.108)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.1 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | Low |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H |
References
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8f3fafc9c2f0ece10832c25f7ffcb07c97a32ad4
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.6
- https://ubuntu.com/security/notices/USN-3797-1
- https://ubuntu.com/security/notices/USN-3797-2
- https://ubuntu.com/security/notices/USN-3820-1
- https://ubuntu.com/security/notices/USN-3820-2
- https://ubuntu.com/security/notices/USN-3820-3
- https://ubuntu.com/security/notices/USN-3822-1
- https://ubuntu.com/security/notices/USN-3822-2
- https://www.cve.org/CVERecord?id=CVE-2018-16658
- NVD
- Launchpad
- Debian