{"id":"USN-3678-4","summary":"linux-raspi2 vulnerabilities","details":"Wen Xu discovered that the ext4 filesystem implementation in the Linux\nkernel did not properly handle corrupted meta data in some situations. An\nattacker could use this to specially craft an ext4 file system that caused\na denial of service (system crash) when mounted. (CVE-2018-1092)\n\nIt was discovered that the 802.11 software simulator implementation in the\nLinux kernel contained a memory leak when handling certain error\nconditions. A local attacker could possibly use this to cause a denial of\nservice (memory exhaustion). (CVE-2018-8087)\n\nIt was discovered that a memory leak existed in the Serial Attached SCSI\n(SAS) implementation in the Linux kernel. A physically proximate attacker\ncould use this to cause a denial of service (memory exhaustion).\n(CVE-2018-10021)\n","modified":"2026-02-10T04:41:21Z","published":"2018-06-15T05:17:04Z","related":["UBUNTU-CVE-2018-10021","UBUNTU-CVE-2018-1092","UBUNTU-CVE-2018-8087"],"upstream":["CVE-2018-10021","CVE-2018-1092","CVE-2018-8087","UBUNTU-CVE-2018-10021","UBUNTU-CVE-2018-1092","UBUNTU-CVE-2018-8087"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3678-4"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-1092"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-8087"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-10021"}],"affected":[{"package":{"name":"linux-raspi2","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-raspi2@4.15.0-1012.13?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1012.13"}]}],"versions":["4.13.0-1005.5","4.13.0-1006.6","4.13.0-1008.8","4.15.0-1006.7","4.15.0-1009.10","4.15.0-1010.11","4.15.0-1011.12"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.15.0-1012.13","binary_name":"linux-headers-4.15.0-1012-raspi2"},{"binary_version":"4.15.0-1012.13","binary_name":"linux-image-4.15.0-1012-raspi2"},{"binary_version":"4.15.0-1012.13","binary_name":"linux-modules-4.15.0-1012-raspi2"},{"binary_version":"4.15.0-1012.13","binary_name":"linux-raspi2-headers-4.15.0-1012"},{"binary_version":"4.15.0-1012.13","binary_name":"linux-raspi2-tools-4.15.0-1012"},{"binary_version":"4.15.0-1012.13","binary_name":"linux-tools-4.15.0-1012-raspi2"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-1092"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-8087"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2018-10021"}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3678-4.json"}}],"schema_version":"1.7.3"}