TROYANOSYVIRUS
Retour aux CVEs

CVE-2018-1068

MEDIUM
6.7

Description

A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.

Details CVE

Score CVSS v3.16.7
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueLOCAL
ComplexiteLOW
Privileges requisHIGH
Interaction utilisateurNONE
Publie3/16/2018
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0

Produits affectes

canonical:ubuntu_linuxdebian:debian_linuxlinux:linux_kernelredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_eusredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstationredhat:virtualization_host

Faiblesses (CWE)

CWE-119CWE-787

References

https://usn.ubuntu.com/3654-1/(secalert@redhat.com)
https://usn.ubuntu.com/3654-2/(secalert@redhat.com)
https://usn.ubuntu.com/3656-1/(secalert@redhat.com)
https://usn.ubuntu.com/3674-1/(secalert@redhat.com)
https://usn.ubuntu.com/3674-2/(secalert@redhat.com)
https://usn.ubuntu.com/3677-1/(secalert@redhat.com)
https://usn.ubuntu.com/3677-2/(secalert@redhat.com)
http://www.securityfocus.com/bid/103459(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1318(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1355(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2948(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:1170(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:1190(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:4159(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1552048(af854a3a-2127-422b-91ae-364da2661108)
https://marc.info/?l=linux-netdev&m=152023808817590&w=2(af854a3a-2127-422b-91ae-364da2661108)
https://marc.info/?l=linux-netdev&m=152025888924151&w=2(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3654-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3654-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3656-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3674-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3674-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3677-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3677-2/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2018/dsa-4187(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2018/dsa-4188(af854a3a-2127-422b-91ae-364da2661108)

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.