Description
A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1731-1 | linux security update |
Debian DLA |
DLA-1731-2 | linux regression update |
Debian DLA |
DLA-1771-1 | linux-4.9 security update |
EUVD |
EUVD-2018-8674 | A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. |
Ubuntu USN |
USN-3932-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3932-2 | Linux kernel (Xenial HWE) vulnerabilities |
Ubuntu USN |
USN-3980-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3980-2 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-3981-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3981-2 | Linux kernel (HWE) vulnerabilities |
References
History
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T10:32:54.149Z
Reserved: 2018-09-11T00:00:00.000Z
Link: CVE-2018-16884
No data.
Status : Modified
Published: 2018-12-18T22:29:04.713
Modified: 2024-11-21T03:53:31.757
Link: CVE-2018-16884
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN