Vulnerability Description
A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 3.2.102 |
| Canonical | Ubuntu Linux | 12.04 |
| Debian | Debian Linux | 7.0 |
| Redhat | Virtualization Host | 4.0 |
| Redhat | Enterprise Linux Desktop | 7.0 |
| Redhat | Enterprise Linux Server | 7.0 |
| Redhat | Enterprise Linux Server Aus | 7.6 |
| Redhat | Enterprise Linux Server Eus | 7.5 |
| Redhat | Enterprise Linux Server Tus | 7.6 |
| Redhat | Enterprise Linux Workstation | 7.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/103459Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:1318Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:1355Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:2948Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:1170Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:1190Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:4159Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1552048Issue TrackingThird Party Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b7PatchVendor Advisory
- https://github.com/torvalds/linux/commit/b71812168571fa55e44cdd0254471331b9c4c4cPatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/05/msg00000.htmlMailing ListThird Party Advisory
- https://marc.info/?l=linux-netdev&m=152023808817590&w=2Third Party Advisory
- https://marc.info/?l=linux-netdev&m=152025888924151&w=2PatchThird Party Advisory
- https://usn.ubuntu.com/3654-1/Third Party Advisory
- https://usn.ubuntu.com/3654-2/Third Party Advisory
FAQ
What is CVE-2018-1068?
CVE-2018-1068 is a vulnerability with a CVSS score of 6.7 (MEDIUM). A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.
How severe is CVE-2018-1068?
CVE-2018-1068 has been rated MEDIUM with a CVSS base score of 6.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-1068?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Canonical Ubuntu Linux, Debian Debian Linux, Redhat Virtualization Host, Redhat Enterprise Linux Desktop.