Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-16884

Опубликовано: 18 дек. 2018
Источник: debian
EPSS Низкий

Описание

A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.19.16-1package
linuxfixed4.9.161-1stretchpackage

Примечания

  • https://patchwork.kernel.org/cover/10733767/

  • https://patchwork.kernel.org/patch/10733769/

  • https://bugzilla.redhat.com/show_bug.cgi?id=1660375

EPSS

Процентиль: 29%
0.001
Низкий

Связанные уязвимости

CVSS3: 8
ubuntu
больше 6 лет назад

A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.

CVSS3: 6.5
redhat
больше 6 лет назад

A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.

CVSS3: 8
nvd
больше 6 лет назад

A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.

suse-cvrf
больше 6 лет назад

Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP2)

suse-cvrf
больше 6 лет назад

Security update for the Linux Kernel (Live Patch 35 for SLE 12)

EPSS

Процентиль: 29%
0.001
Низкий