CVE-2018-1108
5.9MEDIUMkernel drivers before version 4.17-rc1 are vulnerable to a weakness in the Linux kernel's implementation of random seed data. Programs, early in the boot sequence, could use the data allocated for the
Publicado: 5/21/2018Atualizado: 11/21/2024
Descrição
kernel drivers before version 4.17-rc1 are vulnerable to a weakness in the Linux kernel's implementation of random seed data. Programs, early in the boot sequence, could use the data allocated for the seed before it was sufficiently generated.
Análise IADesenvolvido por IA
Produtos Afetados
linuxlinux_kernel
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
debiandebian_linux
9.0
Referências
- http://www.securityfocus.com/bid/104055Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1108Issue TrackingThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/07/msg00000.htmlMailing ListThird Party Advisory
- https://usn.ubuntu.com/3718-1/Third Party Advisory
- https://usn.ubuntu.com/3718-2/Third Party Advisory
- https://usn.ubuntu.com/3752-1/Third Party Advisory
- https://usn.ubuntu.com/3752-2/Third Party Advisory
- https://usn.ubuntu.com/3752-3/Third Party Advisory
- https://www.debian.org/security/2018/dsa-4188Third Party Advisory
- http://www.securityfocus.com/bid/104055Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1108Issue TrackingThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/07/msg00000.htmlMailing ListThird Party Advisory
- https://usn.ubuntu.com/3718-1/Third Party Advisory
- https://usn.ubuntu.com/3718-2/Third Party Advisory
- https://usn.ubuntu.com/3752-1/Third Party Advisory
- https://usn.ubuntu.com/3752-2/Third Party Advisory
- https://usn.ubuntu.com/3752-3/Third Party Advisory
- https://www.debian.org/security/2018/dsa-4188Third Party Advisory