Ubuntu update for linux



| Updated: 2025-04-23
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2018-10323
CWE-ID CWE-476
Exploitation vector Local
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Ubuntu
Operating systems & Components / Operating system

linux-image-virtual-lts-xenial (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-powerpc64-smp-lts-xenial (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-powerpc64-emb-lts-xenial (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-powerpc-smp-lts-xenial (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-powerpc-e500mc-lts-xenial (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-lowlatency-lts-xenial (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-generic-lts-xenial (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-generic-lpae-lts-xenial (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-4.4.0-1077-aws (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-aws (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-4.4.0-189-powerpc64-smp (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-4.4.0-189-powerpc64-emb (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-4.4.0-189-powerpc-smp (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-4.4.0-189-powerpc-e500mc (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-4.4.0-189-lowlatency (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-4.4.0-189-generic-lpae (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-4.4.0-189-generic (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-kvm (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-4.4.0-1079-kvm (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-virtual (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-snapdragon (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-raspi2 (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-powerpc64-smp (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-powerpc64-emb (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-powerpc-smp (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-powerpc-e500mc (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-lowlatency (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-generic-lpae (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-generic (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-4.4.0-1142-snapdragon (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-4.4.0-1138-raspi2 (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-4.4.0-1113-aws (Ubuntu package)
Operating systems & Components / Operating system package or component

Vendor Canonical Ltd.

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) NULL pointer dereference

EUVDB-ID: #VU12185

Risk: Low

CVSSv4.0: 5.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2018-10323

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists in the xfs_bmap_extents_to_btree function in the fs/xfs/libxfs/xfs_bmap.c source code file due to NULL pointer dereference when handling Extended File System (XFS) images. A local attacker can mount a specially crafted XFS filesystem image when filesystem operations are executed on the mounted image and cause the service to crash.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 14.04 - 16.04

linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.189.165

linux-image-powerpc64-smp-lts-xenial (Ubuntu package): before 4.4.0.189.165

linux-image-powerpc64-emb-lts-xenial (Ubuntu package): before 4.4.0.189.165

linux-image-powerpc-smp-lts-xenial (Ubuntu package): before 4.4.0.189.165

linux-image-powerpc-e500mc-lts-xenial (Ubuntu package): before 4.4.0.189.165

linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.189.165

linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.189.165

linux-image-generic-lpae-lts-xenial (Ubuntu package): before 4.4.0.189.165

linux-image-4.4.0-1077-aws (Ubuntu package): before 4.4.0-1077.81

linux-image-aws (Ubuntu package): before 4.4.0.1077.74

linux-image-4.4.0-189-powerpc64-smp (Ubuntu package): before 4.4.0-189.219~14.04.1

linux-image-4.4.0-189-powerpc64-emb (Ubuntu package): before 4.4.0-189.219~14.04.1

linux-image-4.4.0-189-powerpc-smp (Ubuntu package): before 4.4.0-189.219~14.04.1

linux-image-4.4.0-189-powerpc-e500mc (Ubuntu package): before 4.4.0-189.219~14.04.1

linux-image-4.4.0-189-lowlatency (Ubuntu package): before 4.4.0-189.219~14.04.1

linux-image-4.4.0-189-generic-lpae (Ubuntu package): before 4.4.0-189.219~14.04.1

linux-image-4.4.0-189-generic (Ubuntu package): before 4.4.0-189.219~14.04.1

linux-image-kvm (Ubuntu package): before 4.4.0.1079.77

linux-image-4.4.0-1079-kvm (Ubuntu package): before 4.4.0-1079.86

linux-image-virtual (Ubuntu package): before 4.4.0.189.195

linux-image-snapdragon (Ubuntu package): before 4.4.0.1142.134

linux-image-raspi2 (Ubuntu package): before 4.4.0.1138.138

linux-image-powerpc64-smp (Ubuntu package): before 4.4.0.189.195

linux-image-powerpc64-emb (Ubuntu package): before 4.4.0.189.195

linux-image-powerpc-smp (Ubuntu package): before 4.4.0.189.195

linux-image-powerpc-e500mc (Ubuntu package): before 4.4.0.189.195

linux-image-lowlatency (Ubuntu package): before 4.4.0.189.195

linux-image-generic-lpae (Ubuntu package): before 4.4.0.189.195

linux-image-generic (Ubuntu package): before 4.4.0.189.195

linux-image-4.4.0-1142-snapdragon (Ubuntu package): before 4.4.0-1142.151

linux-image-4.4.0-1138-raspi2 (Ubuntu package): before 4.4.0-1138.147

linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0-1113.126

CPE2.3 External links

https://ubuntu.com/security/notices/USN-4486-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###