First published: Mon Feb 12 2018(Updated: )
Last updated 29 November 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <4.14.15 | 4.14.15 |
Google Android | ||
Linux Kernel | <4.14.15 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =17.10 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
redhat virtualization host | =4.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server eus | =7.6 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux workstation | =7.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 6.12.11-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-6927 is significant as it can lead to denial of service or potentially other impacts.
To fix CVE-2018-6927, ensure that your Linux kernel version is upgraded to at least 4.14.15 or a later version.
CVE-2018-6927 affects multiple systems including certain versions of Debian, Ubuntu, and Red Hat Enterprise Linux.
Yes, CVE-2018-6927 can be exploited by attackers to cause denial of service due to integer overflow vulnerabilities.
CVE-2018-6927 is not present in Linux kernel versions that are newer than 4.14.15.