A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.2.102"
}
]
},
{
"events": [
{
"introduced": "3.3"
},
{
"fixed": "3.16.57"
}
]
},
{
"events": [
{
"introduced": "3.17"
},
{
"fixed": "3.18.100"
}
]
},
{
"events": [
{
"introduced": "3.19"
},
{
"fixed": "4.1.51"
}
]
},
{
"events": [
{
"introduced": "4.2"
},
{
"fixed": "4.4.122"
}
]
},
{
"events": [
{
"introduced": "4.5"
},
{
"fixed": "4.9.88"
}
]
},
{
"events": [
{
"introduced": "4.10"
},
{
"fixed": "4.14.27"
}
]
},
{
"events": [
{
"introduced": "4.15"
},
{
"fixed": "4.15.10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "14.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "17.10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-1068.json"
[
{
"id": "CVE-2018-1068-591b9f71",
"digest": {
"line_hashes": [
"255622632361797097115773306345202848429",
"207866867995120051277310976169313605973",
"290166600378863595526580270753210573014",
"317999058989095874985838863324132551046",
"258106106354711310492834148269981971536",
"115022362363228701739095974166226040694",
"197232825218272715593862028288791434930"
],
"threshold": 0.9
},
"signature_type": "Line",
"source": "https://github.com/torvalds/linux/commit/b71812168571fa55e44cdd0254471331b9c4c4c6",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/bridge/netfilter/ebtables.c"
}
},
{
"id": "CVE-2018-1068-5dbaece2",
"digest": {
"function_hash": "68040916467074564211321255042952810286",
"length": 1077.0
},
"signature_type": "Function",
"source": "https://github.com/torvalds/linux/commit/b71812168571fa55e44cdd0254471331b9c4c4c6",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/bridge/netfilter/ebtables.c",
"function": "ebt_size_mwt"
}
},
{
"id": "CVE-2018-1068-74bcf8e8",
"digest": {
"function_hash": "275264441965877635518307668970725812954",
"length": 1778.0
},
"signature_type": "Function",
"source": "https://github.com/torvalds/linux/commit/b71812168571fa55e44cdd0254471331b9c4c4c6",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/bridge/netfilter/ebtables.c",
"function": "size_entry_mwt"
}
}
]