CVE-2018-18653 REJECTED

The Linux kernel, as used in Ubuntu 18.10 and when booted with UEFI Secure Boot enabled, allows privileged local users to bypass intended Secure Boot restrictions and execute untrusted code by loading arbitrary kernel modules. This occurs because a modified kernel/module.c, in conjunction with certain configuration options, leads to mishandling of the result of signature verification.

EPSS 0.02% · 6.0th percentile

Risk Scores

EPSS Score
0.02%
6.0th percentile

Affected Products

VendorProductVersions
Ubuntu:16.04:LTSlinux-aws0
Ubuntu:18.04:LTSlinux-oem0
Ubuntu:16.04:LTSlinux-aws-hwe0
Ubuntu:18.04:LTSlinux0
Ubuntu:16.04:LTSlinux-gcp0
Ubuntu:16.04:LTSlinux-hwe0
Ubuntu:14.04:LTSlinux-azure0
Ubuntu:16.04:LTSlinux0
Ubuntu:16.04:LTSlinux-kvm0
Ubuntu:18.04:LTSlinux-aws0
Ubuntu:18.04:LTSlinux-gcp0
Ubuntu:18.04:LTSlinux-azure-edge0
Ubuntu:18.04:LTSlinux-oracle0
Ubuntu:14.04:LTSlinux0
Ubuntu:14.04:LTSlinux-aws0
Ubuntu:18.04:LTSlinux-raspi20
Ubuntu:14.04:LTSlinux-lts-xenial0
Ubuntu:18.04:LTSlinux-gcp-edge0
Ubuntu:16.04:LTSlinux-azure-edge0
Ubuntu:16.04:LTSlinux-azure0

…and 6 more

Timeline

References

Open in Interactive Console →