TROYANOSYVIRUS
Back to CVEs

CVE-2018-1068

MEDIUM
6.7

Description

A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.

CVE Details

CVSS v3.1 Score6.7
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredHIGH
User InteractionNONE
Published3/16/2018
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0

Affected Products

canonical:ubuntu_linuxdebian:debian_linuxlinux:linux_kernelredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_eusredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstationredhat:virtualization_host

Weaknesses (CWE)

CWE-119CWE-787

References

https://usn.ubuntu.com/3654-1/(secalert@redhat.com)
https://usn.ubuntu.com/3654-2/(secalert@redhat.com)
https://usn.ubuntu.com/3656-1/(secalert@redhat.com)
https://usn.ubuntu.com/3674-1/(secalert@redhat.com)
https://usn.ubuntu.com/3674-2/(secalert@redhat.com)
https://usn.ubuntu.com/3677-1/(secalert@redhat.com)
https://usn.ubuntu.com/3677-2/(secalert@redhat.com)
http://www.securityfocus.com/bid/103459(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1318(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1355(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2948(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:1170(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:1190(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:4159(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1552048(af854a3a-2127-422b-91ae-364da2661108)
https://marc.info/?l=linux-netdev&m=152023808817590&w=2(af854a3a-2127-422b-91ae-364da2661108)
https://marc.info/?l=linux-netdev&m=152025888924151&w=2(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3654-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3654-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3656-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3674-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3674-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3677-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3677-2/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2018/dsa-4187(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2018/dsa-4188(af854a3a-2127-422b-91ae-364da2661108)

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.