CVE-2018-8822 PUBLISHED

Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.

EPSS 0.06% · 18.6th percentile

Risk Scores

EPSS Score
0.06%
18.6th percentile

Affected Products

VendorProductVersions
Ubuntu:24.04:LTSlinux-azure-6.116.11.0-1018.18~24.04.1, 6.11.0-1017.17~24.04.1, 0
Ubuntu:24.04:LTSlinux-raspi-realtime6.8.0-2019.20, 0
Ubuntu:14.04:LTSlinux3.12.0-7.15, 3.13.0-1.16, 3.13.0-2.17
Ubuntu:16.04:LTSlinux-gcp4.13.0-1002.5, 4.13.0-1006.9, 4.13.0-1007.10
Ubuntu:24.04:LTSlinux-hwe-6.110, 6.11.0-19.19~24.04.1, 6.11.0-21.21~24.04.1
Ubuntu:22.04:LTSlinux-intel-iot-realtime0, 5.15.0-1073.75
Ubuntu:Pro:FIPS:16.04:LTSlinux-fips4.4.0-1003.3, 4.4.0-1005.5, 4.4.0-1006.6
Ubuntu:16.04:LTSlinux-kvm0, 4.4.0-1015.20, 4.4.0-1017.22
Ubuntu:Pro:20.04:LTSlinux-azure-fde-5.155.15.0-1041.48~20.04.1.1, 0, 5.15.0-1019.24~20.04.1.1
Ubuntu:24.04:LTSlinux-gcp-6.116.11.0-1016.16~24.04.1, 6.11.0-1017.17~24.04.1, 0
Ubuntu:20.04:LTSlinux-azure-fde5.4.0-1068.71+cvm1.1, 5.4.0-1065.68+cvm2.1, 5.4.0-1064.67+cvm1.1
Ubuntu:22.04:LTSlinux-realtime5.15.0-1032.35, 0
Ubuntu:16.04:LTSlinux-hwe4.8.0-52.55~16.04.1, 0, 4.8.0-36.36~16.04.1
Ubuntu:14.04:LTSlinux-lts-xenial4.4.0-28.47~14.04.1, 4.4.0-36.55~14.04.1, 4.4.0-34.53~14.04.1
Ubuntu:20.04:LTSlinux-gke5.4.0-1041.43, 5.4.0-1037.39, 5.4.0-1036.38
Ubuntu:14.04:LTSlinux-aws0, 4.4.0-1002.2, 4.4.0-1003.3
Ubuntu:16.04:LTSlinux-aws4.4.0-1020.29, 4.4.0-1017.26, 4.4.0-1016.25
Ubuntu:16.04:LTSlinux4.4.0-64.85, 4.4.0-66.87, 4.4.0-67.88
Ubuntu:16.04:LTSlinux-raspi24.4.0-1012.16, 4.4.0-1010.12, 4.4.0-1057.64
Ubuntu:20.04:LTSlinux-riscv5.4.0-40.45, 5.4.0-39.44, 5.4.0-37.42

…and 6 more

Timeline

References

Open in Interactive Console →