Linux Kernel is prone to a local privilege-escalation vulnerabilities.
Local attackers may exploit this issue to gain elevated privileges. Failed exploit attempts will likely cause a denial-of-service condition.
Information
Redhat Enterprise Linux 7
Linux kernel 4.15.9
Linux kernel 4.15.4
Linux kernel 4.14.13
Linux kernel 4.14.11
Linux kernel 4.14.10
Linux kernel 4.14.6
Linux kernel 4.14.5
Linux kernel 4.14.1
Linux kernel 4.13.11
Linux kernel 4.13.10
Linux kernel 4.13.9
Linux kernel 4.13.8
Linux kernel 4.13.7
Linux kernel 4.13.6
Linux kernel 4.13.4
Linux kernel 4.13.3
Linux kernel 4.12.9
Linux kernel 4.12.4
Linux kernel 4.12.3
Linux kernel 4.12.2
Linux kernel 4.11.9
Linux kernel 4.11.5
Linux kernel 4.11.4
Linux kernel 4.11.3
Linux kernel 4.11.2
Linux kernel 4.11.1
Linux kernel 4.11
Linux kernel 4.10.15
Linux kernel 4.10.13
Linux kernel 4.10.12
Linux kernel 4.10.10
Linux kernel 4.10.6
Linux kernel 4.10.4
Linux kernel 4.10
Linux kernel 4.9.74
Linux kernel 4.9.71
Linux kernel 4.9.68
Linux kernel 4.9.36
Linux kernel 4.9.13
Linux kernel 4.9.8
Linux kernel 4.9.4
Linux kernel 4.9.3
Linux kernel 4.8.11
Linux kernel 4.7.4
Linux kernel 4.4.105
Linux kernel 4.4.30
Linux kernel 4.4.29
Linux kernel 4.4.28
Linux kernel 4.4.27
Linux kernel 4.4.25
Linux kernel 4.4.24
Linux kernel 4.4.23
Linux kernel 4.4.22
Linux kernel 4.4.7
Linux kernel 4.4.2
Linux kernel 4.2.3
Linux kernel 4.1.47
Linux kernel 4.1.4
Linux kernel 4.1.1
Linux kernel 4.0.6
Linux kernel 4.9.9
Linux kernel 4.9.11
Linux kernel 4.9-rc8
Linux kernel 4.9-rc4
Linux kernel 4.9-rc3
Linux kernel 4.9-rc1
Linux kernel 4.9
Linux kernel 4.8.7
Linux kernel 4.8.6
Linux kernel 4.8.3
Linux kernel 4.8.14
Linux kernel 4.8.13
Linux kernel 4.8.12
Linux kernel 4.8.1
Linux kernel 4.8 rc1
Linux kernel 4.8
Linux kernel 4.7.9
Linux kernel 4.7-rc6
Linux kernel 4.7-rc5
Linux kernel 4.7-rc1
Linux kernel 4.6.3
Linux kernel 4.6.2
Linux kernel 4.6.1
Linux kernel 4.6-rc1
Linux kernel 4.6 rc7
Linux kernel 4.6 rc6
Linux kernel 4.6
Linux kernel 4.5.5
Linux kernel 4.5-rc7
Linux kernel 4.5-rc4
Linux kernel 4.5-rc2
Linux kernel 4.5-rc1
Linux kernel 4.5
Linux kernel 4.4.38
Linux kernel 4.4.26
Linux kernel 4.4.14
Linux kernel 4.4.1
Linux kernel 4.4.0-57
Linux kernel 4.4-rc5
Linux kernel 4.4-rc4
Linux kernel 4.4-rc1
Linux kernel 4.4
Linux kernel 4.3.3
Linux kernel 4.3-rc1
Linux kernel 4.2.8
Linux kernel 4.2
Linux kernel 4.15.8
Linux kernel 4.15.7
Linux kernel 4.15-rc5
Linux kernel 4.15
Linux kernel 4.14.8
Linux kernel 4.14.7
Linux kernel 4.14.4
Linux kernel 4.14.3
Linux kernel 4.14.2
Linux kernel 4.14.15
Linux kernel 4.14.14
Linux kernel 4.14.0-rc1
Linux kernel 4.14-rc5
Linux kernel 4.14-rc1
Linux kernel 4.14
Linux kernel 4.13.5
Linux kernel 4.13.2
Linux kernel 4.13.1
Linux kernel 4.13-rc1
Linux kernel 4.13
Linux kernel 4.12.10
Linux kernel 4.12.1
Linux kernel 4.12-rc1
Linux kernel 4.12
Linux kernel 4.11.8
Linux kernel 4.11.7
Linux kernel 4.11-rc8
Linux kernel 4.11-rc7
Linux kernel 4.11-rc6
Linux kernel 4.11-rc5
Linux kernel 4.11-rc4
Linux kernel 4.11-rc3
Linux kernel 4.11-rc2
Linux kernel 4.11-rc1
Linux kernel 4.11
Linux kernel 4.10.9
Linux kernel 4.10.8
Linux kernel 4.10.7
Linux kernel 4.10.5
Linux kernel 4.10.3
Linux kernel 4.10.2
Linux kernel 4.10.11
Linux kernel 4.10.1
Linux kernel 4.10-rc8
Linux kernel 4.10-rc1
Linux kernel 4.1.15
Linux kernel 4.1-rc7
Linux kernel 4.1-rc6
Linux kernel 4.1-rc3
Linux kernel 4.1-rc1
Linux kernel 4.1
Linux kernel 4.0.5
Linux kernel 4.0-rc1
Linux kernel 4.0
Exploit
The researcher who discovered this issue has created a proof-of-concept. Please see the references for more information.
References:
- [PATCH net] netfilter: check for out-of-bounds while copying compat entries (Linux)
- Bug 1552048 - (CVE-2018-1068) CVE-2018-1068 kernel: Out-of-bounds write via user (Redhat)
- BUG: unable to handle kernel paging request in compat_copy_entries (Linux)
- CVE-2018-1068 (Redhat)
- Linux Homepage (Linux)
- netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets (Kernel)
- netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets (Github)