redhat virtualization-host CVE-2018-1068 vulnerability in Red Hat and Other Products
Published on March 16, 2018

product logo product logo product logo product logo
A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.

Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory NVD

Weakness Type

What is a Buffer Overflow Vulnerability?

The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.

CVE-2018-1068 has been classified to as a Buffer Overflow vulnerability or weakness.


Products Associated with CVE-2018-1068

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2018-1068 are published in these products:

 
 
 
 
 
 
 
 
 
 

Affected Versions

Linux Kernel Organization, Inc. Linux Kernel Version 4.x is affected by CVE-2018-1068

Exploit Probability

EPSS
0.04%
Percentile
9.98%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.