vulnerability
Ubuntu: (Multiple Advisories) (CVE-2018-18445): Linux kernel (AWS) vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | Oct 17, 2018 | Dec 7, 2018 | Aug 18, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Oct 17, 2018
Added
Dec 7, 2018
Modified
Aug 18, 2025
Description
In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.
Solutions
ubuntu-upgrade-linux-image-4-15-0-1026-gcpubuntu-upgrade-linux-image-4-15-0-1028-kvmubuntu-upgrade-linux-image-4-15-0-1030-oemubuntu-upgrade-linux-image-4-15-0-1030-raspi2ubuntu-upgrade-linux-image-4-15-0-1031-awsubuntu-upgrade-linux-image-4-15-0-1036-azureubuntu-upgrade-linux-image-4-15-0-43-genericubuntu-upgrade-linux-image-4-15-0-43-generic-lpaeubuntu-upgrade-linux-image-4-15-0-43-lowlatencyubuntu-upgrade-linux-image-4-15-0-43-snapdragonubuntu-upgrade-linux-image-4-18-0-1004-gcpubuntu-upgrade-linux-image-4-18-0-1005-kvmubuntu-upgrade-linux-image-4-18-0-1006-awsubuntu-upgrade-linux-image-4-18-0-1007-raspi2ubuntu-upgrade-linux-image-4-18-0-12-genericubuntu-upgrade-linux-image-4-18-0-12-generic-lpaeubuntu-upgrade-linux-image-4-18-0-12-lowlatencyubuntu-upgrade-linux-image-4-18-0-12-snapdragonubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-hweubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragon
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.