A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 03:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/103459 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2018:1318 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:1355 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:2948 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2019:1170 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2019:1190 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2019:4159 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1552048 - Issue Tracking, Third Party Advisory | |
References | () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b71812168571fa55e44cdd0254471331b9c4c4c6 - Patch, Vendor Advisory | |
References | () https://github.com/torvalds/linux/commit/b71812168571fa55e44cdd0254471331b9c4c4c6 - Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html - Mailing List, Third Party Advisory | |
References | () https://marc.info/?l=linux-netdev&m=152023808817590&w=2 - Third Party Advisory | |
References | () https://marc.info/?l=linux-netdev&m=152025888924151&w=2 - Patch, Third Party Advisory | |
References | () https://usn.ubuntu.com/3654-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3654-2/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3656-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3674-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3674-2/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3677-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3677-2/ - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4187 - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4188 - Third Party Advisory |
21 Jun 2023, 15:56
Type | Values Removed | Values Added |
---|---|---|
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:4159 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:1170 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:1190 - Third Party Advisory |
Information
Published : 2018-03-16 16:29
Updated : 2024-11-21 03:59
NVD link : CVE-2018-1068
Mitre link : CVE-2018-1068
CVE.ORG link : CVE-2018-1068
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- enterprise_linux_server_eus
- enterprise_linux_desktop
- enterprise_linux_server_aus
- enterprise_linux_workstation
- enterprise_linux_server_tus
- virtualization_host
canonical
- ubuntu_linux
linux
- linux_kernel
debian
- debian_linux