Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-16884


A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.


Published

2018-12-18T22:29:04.713

Last Modified

2024-11-21T03:53:31.757

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.0 (HIGH)

CVSSv2 Vector

AV:A/AC:L/Au:S/C:P/I:P/A:C

  • Access Vector: ADJACENT_NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: COMPLETE
Exploitability Score

5.1

Impact Score

8.5

Weaknesses
  • Type: Primary
    CWE-416
  • Type: Secondary
    CWE-416

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel < 3.16.65 Yes
Operating System linux linux_kernel < 3.18.133 Yes
Operating System linux linux_kernel < 4.4.171 Yes
Operating System linux linux_kernel < 4.9.151 Yes
Operating System linux linux_kernel < 4.14.94 Yes
Operating System linux linux_kernel < 4.19.16 Yes
Operating System linux linux_kernel < 4.20.3 Yes
Operating System redhat enterprise_linux 7.0 Yes
Operating System redhat enterprise_mrg 2.0 Yes
Operating System debian debian_linux 8.0 Yes
Operating System canonical ubuntu_linux 14.04 Yes
Operating System canonical ubuntu_linux 16.04 Yes

References