Linux kernel vulnerabilities in Ubuntu 18.04 ESM and 16.04 ESM. Race condition, use-after-free, and reference counting errors
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Ubuntu | 18.04 | noarch | linux-image-4.15.0-197-generic | 4.15.0-197.208 | UNKNOWN |
Ubuntu | 18.04 | noarch | kernel-signed-image-4.15.0-197-generic-di | 4.15.0-197.208 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-image-4.15.0-197-generic-dbgsym | 4.15.0-197.208 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-image-4.15.0-197-lowlatency | 4.15.0-197.208 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-image-4.15.0-197-lowlatency-dbgsym | 4.15.0-197.208 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-image-virtual | 4.15.0.197.182 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-cloud-tools-generic | 4.15.0.197.182 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-cloud-tools-generic-hwe-16.04 | 4.15.0.197.182 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-cloud-tools-generic-hwe-16.04-edge | 4.15.0.197.182 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-cloud-tools-lowlatency | 4.15.0.197.182 | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo