First published: Wed Mar 21 2018(Updated: )
Last updated 29 November 2024
Credit: cve@checkpoint.com cve@checkpoint.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=3.4<3.16.57 | |
Linux Linux kernel | >=3.17<3.18.103 | |
Linux Linux kernel | >=3.19<4.1.52 | |
Linux Linux kernel | >=4.2<4.4.125 | |
Linux Linux kernel | >=4.5<4.9.91 | |
Linux Linux kernel | >=4.10<4.14.31 | |
Linux Linux kernel | >=4.15<4.15.14 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
redhat/kernel | <4.16 | 4.16 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-8781 is high with a severity value of 7.
The affected software for CVE-2018-8781 includes Ubuntu Linux with versions up to 4.16~, Ubuntu Linux Trusty with versions up to 3.13.0-151.201, Ubuntu Linux Xenial with versions up to 4.4.0-127.153, and Ubuntu Linux Artful with versions up to 4.13.0-45.50.
The remedy for CVE-2018-8781 is to update the Linux kernel to version 4.16~ or higher.
You can find more information about CVE-2018-8781 at the following references: [Patchwork](https://patchwork.freedesktop.org/patch/211845/), [DSA-4187](https://www.debian.org/security/2018/dsa-4187), [DSA-4188](https://www.debian.org/security/2018/dsa-4188).
The CWE category of CVE-2018-8781 is CWE-190 (Integer Overflow or Wraparound).