{"id":"CVE-2018-1068","details":"A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.","modified":"2026-04-16T06:16:11.699931994Z","published":"2018-03-16T16:29:00.207Z","related":["SUSE-SU-2018:0785-1","SUSE-SU-2018:0786-1","SUSE-SU-2018:0834-1","SUSE-SU-2018:0848-1","SUSE-SU-2018:0988-1","SUSE-SU-2018:0989-1","SUSE-SU-2018:0990-1","SUSE-SU-2018:0992-1","SUSE-SU-2018:0993-1","SUSE-SU-2018:0994-1","SUSE-SU-2018:0995-1","SUSE-SU-2018:0996-1","SUSE-SU-2018:0997-1","SUSE-SU-2018:0998-1","SUSE-SU-2018:0999-1","SUSE-SU-2018:1000-1","SUSE-SU-2018:1001-1","SUSE-SU-2018:1002-1","SUSE-SU-2018:1003-1","SUSE-SU-2018:1004-1","SUSE-SU-2018:1005-1","SUSE-SU-2018:1006-1","SUSE-SU-2018:1007-1","SUSE-SU-2018:1008-1","SUSE-SU-2018:1009-1","SUSE-SU-2018:1010-1","SUSE-SU-2018:1011-1","SUSE-SU-2018:1012-1","SUSE-SU-2018:1013-1","SUSE-SU-2018:1014-1","SUSE-SU-2018:1015-1","SUSE-SU-2018:1016-1","SUSE-SU-2018:1018-1","SUSE-SU-2018:1019-1","SUSE-SU-2018:1020-1","SUSE-SU-2018:1021-1","SUSE-SU-2018:1022-1","SUSE-SU-2018:1023-1","SUSE-SU-2018:1024-1","SUSE-SU-2018:1025-1","SUSE-SU-2018:1026-1","SUSE-SU-2018:1027-1","SUSE-SU-2018:1028-1","SUSE-SU-2018:1029-1","SUSE-SU-2018:1030-1","SUSE-SU-2018:1031-1","SUSE-SU-2018:1032-1","SUSE-SU-2018:1033-1","SUSE-SU-2018:1034-1","SUSE-SU-2018:2332-1","SUSE-SU-2018:2366-1","SUSE-SU-2018:2637-1","openSUSE-SU-2024:10728-1","openSUSE-SU-2024:13704-1"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1170"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1190"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:4159"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3654-2/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4188"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2948"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3656-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3677-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3677-2/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3674-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3674-2/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4187"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/103459"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1318"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1355"},{"type":"ADVISORY","url":"https://marc.info/?l=linux-netdev&m=152023808817590&w=2"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3654-1/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1552048"},{"type":"FIX","url":"https://marc.info/?l=linux-netdev&m=152025888924151&w=2"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b71812168571fa55e44cdd0254471331b9c4c4c6"},{"type":"FIX","url":"https://github.com/torvalds/linux/commit/b71812168571fa55e44cdd0254471331b9c4c4c6"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git","events":[{"introduced":"0"},{"last_affected":"39a8804455fb23f09157341d3ba7db6d7ae6ee76"},{"fixed":"b71812168571fa55e44cdd0254471331b9c4c4c6"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.0"}]}},{"type":"GIT","repo":"https://github.com/torvalds/linux","events":[{"introduced":"0"},{"fixed":"b71812168571fa55e44cdd0254471331b9c4c4c6"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-1068.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"3.2.102"}]},{"events":[{"introduced":"3.3"},{"fixed":"3.16.57"}]},{"events":[{"introduced":"3.17"},{"fixed":"3.18.100"}]},{"events":[{"introduced":"3.19"},{"fixed":"4.1.51"}]},{"events":[{"introduced":"4.2"},{"fixed":"4.4.122"}]},{"events":[{"introduced":"4.5"},{"fixed":"4.9.88"}]},{"events":[{"introduced":"4.10"},{"fixed":"4.14.27"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.15.10"}]},{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"17.10"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.5"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}