{"id":"USN-3697-2","summary":"linux-oem vulnerabilities","details":"It was discovered that a null pointer dereference vulnerability existed in\nthe DCCP protocol implementation in the Linux kernel. A local attacker\ncould use this to cause a denial of service (system crash). (CVE-2018-1130)\n\nJann Horn discovered that the 32 bit adjtimex() syscall implementation for\n64 bit Linux kernels did not properly initialize memory returned to user\nspace in some situations. A local attacker could use this to expose\nsensitive information (kernel memory). (CVE-2018-11508)\n\nWang Qize discovered that an information disclosure vulnerability existed\nin the SMBus driver for ACPI Embedded Controllers in the Linux kernel. A\nlocal attacker could use this to expose sensitive information (kernel\npointer addresses). (CVE-2018-5750)\n\nIt was discovered that the SCTP Protocol implementation in the Linux kernel\ndid not properly validate userspace provided payload lengths in some\nsituations. A local attacker could use this to cause a denial of service\n(system crash). (CVE-2018-5803)\n\nIt was discovered that an integer overflow error existed in the futex\nimplementation in the Linux kernel. A local attacker could use this to\ncause a denial of service (system crash). (CVE-2018-6927)\n\nIt was discovered that an information leak vulnerability existed in the\nfloppy driver in the Linux kernel. A local attacker could use this to\nexpose sensitive information (kernel memory). (CVE-2018-7755)\n\nIt was discovered that a memory leak existed in the SAS driver subsystem of\nthe Linux kernel. A local attacker could use this to cause a denial of\nservice (memory exhaustion). (CVE-2018-7757)\n","modified":"2026-02-10T04:41:22Z","published":"2018-07-02T20:05:04Z","related":["UBUNTU-CVE-2018-1130","UBUNTU-CVE-2018-11508","UBUNTU-CVE-2018-5750","UBUNTU-CVE-2018-5803","UBUNTU-CVE-2018-6927","UBUNTU-CVE-2018-7755","UBUNTU-CVE-2018-7757"],"upstream":["CVE-2018-1130","CVE-2018-11508","CVE-2018-5750","CVE-2018-5803","CVE-2018-6927","CVE-2018-7755","CVE-2018-7757","UBUNTU-CVE-2018-1130","UBUNTU-CVE-2018-11508","UBUNTU-CVE-2018-5750","UBUNTU-CVE-2018-5803","UBUNTU-CVE-2018-6927","UBUNTU-CVE-2018-7755","UBUNTU-CVE-2018-7757"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3697-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-1130"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-5750"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-5803"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-6927"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-7755"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-7757"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-11508"}],"affected":[{"package":{"name":"linux-oem","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/linux-oem@4.13.0-1031.35?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.13.0-1031.35"}]}],"versions":["4.13.0-1008.9","4.13.0-1010.11","4.13.0-1012.13","4.13.0-1015.16","4.13.0-1017.18","4.13.0-1019.20","4.13.0-1020.21","4.13.0-1021.23","4.13.0-1022.24","4.13.0-1024.27","4.13.0-1026.29","4.13.0-1028.31","4.13.0-1030.33"],"ecosystem_specific":{"binaries":[{"binary_version":"4.13.0-1031.35","binary_name":"block-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"crypto-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"fat-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"fb-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"firewire-core-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"floppy-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"fs-core-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"fs-secondary-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"input-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"ipmi-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"irda-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"kernel-image-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"linux-headers-4.13.0-1031-oem"},{"binary_version":"4.13.0-1031.35","binary_name":"linux-image-4.13.0-1031-oem"},{"binary_version":"4.13.0-1031.35","binary_name":"linux-oem-headers-4.13.0-1031"},{"binary_version":"4.13.0-1031.35","binary_name":"linux-oem-tools-4.13.0-1031"},{"binary_version":"4.13.0-1031.35","binary_name":"linux-tools-4.13.0-1031-oem"},{"binary_version":"4.13.0-1031.35","binary_name":"linux-udebs-oem"},{"binary_version":"4.13.0-1031.35","binary_name":"md-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"message-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"mouse-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"multipath-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"nfs-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"nic-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"nic-pcmcia-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"nic-shared-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"nic-usb-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"parport-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"pata-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"pcmcia-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"pcmcia-storage-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"plip-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"ppp-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"sata-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"scsi-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"serial-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"storage-core-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"usb-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"virtio-modules-4.13.0-1031-oem-di"},{"binary_version":"4.13.0-1031.35","binary_name":"vlan-modules-4.13.0-1031-oem-di"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3697-2.json","cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2018-1130"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2018-5750"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2018-5803"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2018-6927"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2018-7755"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2018-7757"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2018-11508"}]}}}],"schema_version":"1.7.3"}