Description
Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1369-1 | linux security update |
Debian DSA |
DSA-4187-1 | linux security update |
Debian DSA |
DSA-4188-1 | linux security update |
Ubuntu USN |
USN-3653-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3653-2 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-3654-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3654-2 | Linux kernel (Xenial HWE) vulnerabilities |
Ubuntu USN |
USN-3655-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3655-2 | Linux kernel (Trusty HWE) vulnerabilities |
Ubuntu USN |
USN-3656-1 | Linux kernel (Raspberry Pi 2, Snapdragon) vulnerabilities |
Ubuntu USN |
USN-3657-1 | Linux kernel (Raspberry Pi 2) vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T07:02:26.101Z
Reserved: 2018-03-20T00:00:00.000Z
Link: CVE-2018-8822
No data.
Status : Modified
Published: 2018-03-20T17:29:00.423
Modified: 2024-11-21T04:14:23.320
Link: CVE-2018-8822
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
Ubuntu USN