vulnerability
Ubuntu: (Multiple Advisories) (CVE-2018-18281): Linux kernel (AWS) vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:N/C:P/I:P/A:P) | 2018-10-30 | 2018-12-07 | 2025-01-23 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
2018-10-30
Added
2018-12-07
Modified
2025-01-23
Description
Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. This is fixed in the following kernel versions: 4.9.135, 4.14.78, 4.18.16, 4.19.
Solution(s)
ubuntu-upgrade-linux-image-3-13-0-165-genericubuntu-upgrade-linux-image-3-13-0-165-generic-lpaeubuntu-upgrade-linux-image-3-13-0-165-lowlatencyubuntu-upgrade-linux-image-3-13-0-165-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-165-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-165-powerpc-smpubuntu-upgrade-linux-image-3-13-0-165-powerpc64-embubuntu-upgrade-linux-image-3-13-0-165-powerpc64-smpubuntu-upgrade-linux-image-4-15-0-1027-gcpubuntu-upgrade-linux-image-4-15-0-1029-kvmubuntu-upgrade-linux-image-4-15-0-1031-raspi2ubuntu-upgrade-linux-image-4-15-0-1032-awsubuntu-upgrade-linux-image-4-15-0-1033-oemubuntu-upgrade-linux-image-4-15-0-1037-azureubuntu-upgrade-linux-image-4-15-0-44-genericubuntu-upgrade-linux-image-4-15-0-44-generic-lpaeubuntu-upgrade-linux-image-4-15-0-44-lowlatencyubuntu-upgrade-linux-image-4-15-0-44-snapdragonubuntu-upgrade-linux-image-4-15-0-45-genericubuntu-upgrade-linux-image-4-15-0-45-generic-lpaeubuntu-upgrade-linux-image-4-15-0-45-lowlatencyubuntu-upgrade-linux-image-4-18-0-1004-gcpubuntu-upgrade-linux-image-4-18-0-1005-kvmubuntu-upgrade-linux-image-4-18-0-1006-awsubuntu-upgrade-linux-image-4-18-0-1007-raspi2ubuntu-upgrade-linux-image-4-18-0-12-genericubuntu-upgrade-linux-image-4-18-0-12-generic-lpaeubuntu-upgrade-linux-image-4-18-0-12-lowlatencyubuntu-upgrade-linux-image-4-18-0-12-snapdragonubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-hweubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-lts-trustyubuntu-upgrade-linux-image-generic-lts-trustyubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-powerpc-e500ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-virtual-hwe-16-04
References
- CVE-2018-18281
- https://attackerkb.com/topics/CVE-2018-18281
- NVD-CVE-2018-18281
- UBUNTU-USN-3753-1
- UBUNTU-USN-3753-2
- UBUNTU-USN-3754-1
- UBUNTU-USN-3821-1
- UBUNTU-USN-3821-2
- UBUNTU-USN-3832-1
- UBUNTU-USN-3835-1
- UBUNTU-USN-3871-1
- UBUNTU-USN-3871-2
- UBUNTU-USN-3871-3
- UBUNTU-USN-3871-4
- UBUNTU-USN-3871-5
- UBUNTU-USN-3872-1
- UBUNTU-USN-3878-1
- UBUNTU-USN-3878-2
- UBUNTU-USN-3879-1
- UBUNTU-USN-3879-2
- UBUNTU-USN-3880-1
- UBUNTU-USN-3880-2

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.