TROYANOSYVIRUS
Voltar para CVEs

CVE-2018-1068

MEDIUM
6.7

Descricao

A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.

Detalhes CVE

Pontuacao CVSS v3.16.7
SeveridadeMEDIUM
Vetor CVSSCVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueLOCAL
ComplexidadeLOW
Privilegios necessariosHIGH
Interacao do usuarioNONE
Publicado3/16/2018
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0

Produtos afetados

canonical:ubuntu_linuxdebian:debian_linuxlinux:linux_kernelredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_eusredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstationredhat:virtualization_host

Fraquezas (CWE)

CWE-119CWE-787

Referencias

https://usn.ubuntu.com/3654-1/(secalert@redhat.com)
https://usn.ubuntu.com/3654-2/(secalert@redhat.com)
https://usn.ubuntu.com/3656-1/(secalert@redhat.com)
https://usn.ubuntu.com/3674-1/(secalert@redhat.com)
https://usn.ubuntu.com/3674-2/(secalert@redhat.com)
https://usn.ubuntu.com/3677-1/(secalert@redhat.com)
https://usn.ubuntu.com/3677-2/(secalert@redhat.com)
http://www.securityfocus.com/bid/103459(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1318(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1355(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2948(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:1170(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:1190(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:4159(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1552048(af854a3a-2127-422b-91ae-364da2661108)
https://marc.info/?l=linux-netdev&m=152023808817590&w=2(af854a3a-2127-422b-91ae-364da2661108)
https://marc.info/?l=linux-netdev&m=152025888924151&w=2(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3654-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3654-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3656-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3674-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3674-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3677-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3677-2/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2018/dsa-4187(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2018/dsa-4188(af854a3a-2127-422b-91ae-364da2661108)

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.