Ubuntu 3617-1: Linux kernel vulnerabilities
Summary
Update Instructions
The problem can be corrected by updating your system to the following package versions: Ubuntu 17.10: linux-image-4.13.0-38-generic 4.13.0-38.43 linux-image-4.13.0-38-generic-lpae 4.13.0-38.43 linux-image-4.13.0-38-lowlatency 4.13.0-38.43 linux-image-generic 4.13.0.38.41 linux-image-generic-lpae 4.13.0.38.41 linux-image-lowlatency 4.13.0.38.41 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References
https://ubuntu.com/security/notices/USN-3617-1
CVE-2017-0861, CVE-2017-1000407, CVE-2017-15129, CVE-2017-16532,
CVE-2017-16537, CVE-2017-16645, CVE-2017-16646, CVE-2017-16647,
CVE-2017-16649, CVE-2017-16650, CVE-2017-16994, CVE-2017-17448,
CVE-2017-17450, CVE-2017-17741, CVE-2017-17805, CVE-2017-17806,
CVE-2017-17807, CVE-2017-18204, CVE-2018-1000026, CVE-2018-5332,
CVE-2018-5333, CVE-2018-5344
Package Information
https://launchpad.net/ubuntu/+source/linux/4.13.0-38.43