Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-1068

Опубликовано: 16 мар. 2018
Источник: debian
EPSS Низкий

Описание

A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.15.11-1package

Примечания

  • https://git.kernel.org/linus/b71812168571fa55e44cdd0254471331b9c4c4c6

  • Unprivileged user namespaces are disabled in Debian, this only affects

  • non-standard setups

EPSS

Процентиль: 17%
0.00053
Низкий

Связанные уязвимости

CVSS3: 6.7
ubuntu
больше 7 лет назад

A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.

CVSS3: 8.1
redhat
больше 7 лет назад

A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.

CVSS3: 6.7
nvd
больше 7 лет назад

A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.

CVSS3: 6.7
github
около 3 лет назад

A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.

CVSS3: 6.7
fstec
больше 7 лет назад

Уязвимость интерфейса системных вызовов (SCI) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 17%
0.00053
Низкий