Linux Kernel 32-bit syscall Interface Arbitrary Kernel Memory Write Vulnerability [CVE-2018-1068]
A vulnerability in the 32-bit syscall interface for bridging in the Linux Kernel could allow a local attacker to execute arbitrary code on a targeted system.
The vulnerability is due to improper bounds checking that are performed by the affected software when the ebt_entry struct component, as defined in the netfilter/ebtables.c source code file of the affected software, is used. An attacker could exploit this vulnerability to perform arbitrary write operations to a limited range of kernel memory, which the attacker could use to execute arbitrary code.
Kernel.org has confirmed the vulnerability and released a software patch.
CVE Number – CVE-2018-1068
-
To exploit this vulnerability, an attacker must have local access to the targeted system. This access requirement may reduce the likelihood of a successful exploit.
-
Administrators are advised to apply the appropriate updates.
Administrators are advised to allow only trusted users to access local systems.
Administrators are advised to monitor affected systems.
-
Kernel.org has released a git commit at the following link: commit b71812168571fa55e44cdd0254471331b9c4c4c6
-
-
Kernel.org has released a software patch at the following link: netfilter: ebtables: CONFIG_COMPAT: don’t trust userland offsets
-
![Linux Kernel 32-bit syscall Interface Arbitrary Kernel Memory Write Vulnerability [CVE-2018-1068]](https://i0.wp.com/www.systemtek.co.uk/wp-content/uploads/2022/01/blank-profile-hi.png?resize=100%2C100)
Duncan is a technology professional with over 20 years experience of working in various IT roles. He has a interest in cyber security, and has a wide range of other skills in radio, electronics and telecommunications.