CVE-2018-1068 vulnerability in Red Hat and Other Products
Published on March 16, 2018
A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
NVD
Weakness Type
What is a Buffer Overflow Vulnerability?
The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
CVE-2018-1068 has been classified to as a Buffer Overflow vulnerability or weakness.
Products Associated with CVE-2018-1068
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2018-1068 are published in these products:
Affected Versions
Linux Kernel Organization, Inc. Linux Kernel Version 4.x is affected by CVE-2018-1068Exploit Probability
EPSS
0.04%
Percentile
9.98%
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.