← Volver a CVEs
CVE-2018-1068
MEDIUM6.7
Descripcion
A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.
Detalles CVE
Puntuacion CVSS v3.16.7
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosHIGH
Interaccion usuarioNONE
Publicado3/16/2018
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
canonical:ubuntu_linuxdebian:debian_linuxlinux:linux_kernelredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_eusredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstationredhat:virtualization_host
Debilidades (CWE)
CWE-119CWE-787
Referencias
http://www.securityfocus.com/bid/103459(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:1318(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:1355(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:2948(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:1170(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:1190(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:4159(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=1552048(secalert@redhat.com)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b71812168571fa55e44cdd0254471331b9c4c4c6(secalert@redhat.com)
https://github.com/torvalds/linux/commit/b71812168571fa55e44cdd0254471331b9c4c4c6(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html(secalert@redhat.com)
https://marc.info/?l=linux-netdev&m=152023808817590&w=2(secalert@redhat.com)
https://marc.info/?l=linux-netdev&m=152025888924151&w=2(secalert@redhat.com)
https://usn.ubuntu.com/3654-1/(secalert@redhat.com)
https://usn.ubuntu.com/3654-2/(secalert@redhat.com)
https://usn.ubuntu.com/3656-1/(secalert@redhat.com)
https://usn.ubuntu.com/3674-1/(secalert@redhat.com)
https://usn.ubuntu.com/3674-2/(secalert@redhat.com)
https://usn.ubuntu.com/3677-1/(secalert@redhat.com)
https://usn.ubuntu.com/3677-2/(secalert@redhat.com)
https://www.debian.org/security/2018/dsa-4187(secalert@redhat.com)
https://www.debian.org/security/2018/dsa-4188(secalert@redhat.com)
http://www.securityfocus.com/bid/103459(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1318(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1355(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2948(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:1170(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:1190(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:4159(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1552048(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b71812168571fa55e44cdd0254471331b9c4c4c6(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/torvalds/linux/commit/b71812168571fa55e44cdd0254471331b9c4c4c6(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html(af854a3a-2127-422b-91ae-364da2661108)
https://marc.info/?l=linux-netdev&m=152023808817590&w=2(af854a3a-2127-422b-91ae-364da2661108)
https://marc.info/?l=linux-netdev&m=152025888924151&w=2(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3654-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3654-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3656-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3674-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3674-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3677-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3677-2/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2018/dsa-4187(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2018/dsa-4188(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.