CVE-2018-1108
5.9MEDIUMkernel drivers before version 4.17-rc1 are vulnerable to a weakness in the Linux kernel's implementation of random seed data. Programs, early in the boot sequence, could use the data allocated for the
Veröffentlicht: 5/21/2018Aktualisiert: 11/21/2024
Beschreibung
kernel drivers before version 4.17-rc1 are vulnerable to a weakness in the Linux kernel's implementation of random seed data. Programs, early in the boot sequence, could use the data allocated for the seed before it was sufficiently generated.
KI-AnalyseKI-gestützt
Betroffene Produkte
linuxlinux_kernel
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
debiandebian_linux
9.0
Referenzen
- http://www.securityfocus.com/bid/104055Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1108Issue TrackingThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/07/msg00000.htmlMailing ListThird Party Advisory
- https://usn.ubuntu.com/3718-1/Third Party Advisory
- https://usn.ubuntu.com/3718-2/Third Party Advisory
- https://usn.ubuntu.com/3752-1/Third Party Advisory
- https://usn.ubuntu.com/3752-2/Third Party Advisory
- https://usn.ubuntu.com/3752-3/Third Party Advisory
- https://www.debian.org/security/2018/dsa-4188Third Party Advisory
- http://www.securityfocus.com/bid/104055Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1108Issue TrackingThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/07/msg00000.htmlMailing ListThird Party Advisory
- https://usn.ubuntu.com/3718-1/Third Party Advisory
- https://usn.ubuntu.com/3718-2/Third Party Advisory
- https://usn.ubuntu.com/3752-1/Third Party Advisory
- https://usn.ubuntu.com/3752-2/Third Party Advisory
- https://usn.ubuntu.com/3752-3/Third Party Advisory
- https://www.debian.org/security/2018/dsa-4188Third Party Advisory