Canonical Releases Major Core Updates for Ubuntu 17.10, 16.04 LTS, and 14.04 LTS
After releasing the Ubuntu 18.04 LTS (Bionic Beaver) series operating system kernel update to alleviate the recently disclosed Specrant Variant 4 (CVE-2018-3639) security vulnerability, Canonical has now released Ubuntu 17.10 (Artful Aardvark), Ubuntu 16.04 LTS (Xenial) Major kernel updates for Xerus) and Ubuntu 14.04 LTS (Trusty Tahr) operating systems and their official derivatives.
In addition to addressing the Specter Variant 4 (CVE-2018-3639) vulnerability found in Ubuntu 17.10, Ubuntu 16.04 LTS, and Ubuntu 14.04 LTS 64-bit systems, the new kernel update also fixes a variety of other issues, including: including the Linux kernel Double precision in the USBTV007 driver ( CVE-2017-17975 ), and contention condition (CVE-2017-18203) in the Device Mapper component.
At the same time, an infinite loop problem was fixed in the madvise(2) implementation of the Linux kernel (CVE-2017-18208), a buffer coverage defect in the NCPFS implementation (CVE-2018-8822), and competition in the F2FS implementation. Conditional (CVE-2017-18193), Buffer Overrun in the Hisilicon HNS Ethernet Device Driver (CVE-2017-18222), and Null Pointer Referential Vulnerability in the DCCP Protocol Implementation (CVE-2018-1130).
In the block layer subsystem of the Linux kernel has also solved the double free error (CVE-2018-7480), and SAS subsystem driver memory leaks (CVE-2018-7757) problem, x86 machine check handler The competition conditions (CVE-2018-7995), as well as various other issues in other components, include: Netfilter subsystem, SCTP protocol implementation, netlink subsystem, Xen subsystem, and Bluetooth HIP protocol implementation.