CVE-2018-16884

CVSS v3.1 8 (High)
80% Progress
CVSS v2.0 6.7 (Medium)
67% Progress
EPSS 0.06 % (28th)
0.06% Progress
Affected Products 5
Advisories 33

A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.

Weaknesses
CWE-416
Use After Free
CVE Status
PUBLISHED
CNA
Red Hat, Inc.
Published Date
2018-12-18 22:29:04
(5 years ago)
Updated Date
2023-08-11 19:12:44
(13 months ago)

Affected Products

Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Linux Kernel from 3.7 version and prior 3.16.65 version cpe:2.3:o:linux:linux_kernel >= 3.7 < 3.16.65
  Linux Kernel from 3.17 version and prior 3.18.133 version cpe:2.3:o:linux:linux_kernel >= 3.17 < 3.18.133
  Linux Kernel from 3.19 version and prior 4.4.171 version cpe:2.3:o:linux:linux_kernel >= 3.19 < 4.4.171
  Linux Kernel from 4.5 version and prior 4.9.151 version cpe:2.3:o:linux:linux_kernel >= 4.5 < 4.9.151
  Linux Kernel from 4.10 version and prior 4.14.94 version cpe:2.3:o:linux:linux_kernel >= 4.10 < 4.14.94
  Linux Kernel from 4.15 version and prior 4.19.16 version cpe:2.3:o:linux:linux_kernel >= 4.15 < 4.19.16
  Linux Kernel from 4.20 version and prior 4.20.3 version cpe:2.3:o:linux:linux_kernel >= 4.20 < 4.20.3

Configuration #2

    CPE23 From Up To
  Redhat Enterprise Linux 7.0 cpe:2.3:o:redhat:enterprise_linux:7.0
  Redhat Enterprise Mrg 2.0 cpe:2.3:o:redhat:enterprise_mrg:2.0

Configuration #3

    CPE23 From Up To
  Debian Linux 8.0 cpe:2.3:o:debian:debian_linux:8.0

Configuration #4

    CPE23 From Up To
  Canonical Ubuntu Linux 14.04 cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts
  Canonical Ubuntu Linux 16.04 cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...