Name | CVE-2018-18653 |
Description | The Linux kernel, as used in Ubuntu 18.10 and when booted with UEFI Secure Boot enabled, allows privileged local users to bypass intended Secure Boot restrictions and execute untrusted code by loading arbitrary kernel modules. This occurs because a modified kernel/module.c, in conjunction with certain configuration options, leads to mishandling of the result of signature verification. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more) |
NVD severity | high |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
linux (PTS) | jessie | 3.16.56-1+deb8u1 | undetermined |
| jessie (security) | 3.16.76-1 | undetermined |
| stretch | 4.9.189-3 | undetermined |
| stretch (security) | 4.9.189-3+deb9u2 | undetermined |
| buster | 4.19.67-2+deb10u1 | undetermined |
| buster (security) | 4.19.67-2+deb10u2 | undetermined |
| bullseye | 5.3.9-3 | undetermined |
| sid | 5.3.15-1 | undetermined |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
linux | source | (unstable) | undetermined | | | |
Notes
check, this should be very Ubuntu specific, but it is introduced with the out-of-tree patch from the Lockdown patchset https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/cosmic/commit/?id=03c7de9e956395f3b36f86f89b62780ad9501eef and so possibly affect our kernel as well in some way.