Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-16884

Опубликовано: 27 нояб. 2018
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2019:189129.07.2019
Red Hat Enterprise Linux 7kernelFixedRHSA-2019:187329.07.2019
Red Hat Enterprise Linux 7kernel-altFixedRHSA-2020:285407.07.2020
Red Hat Enterprise Linux 7.4 Extended Update SupportkernelFixedRHSA-2019:269612.09.2019
Red Hat Enterprise Linux 8kernel-rtFixedRHSA-2019:330905.11.2019
Red Hat Enterprise Linux 8kernelFixedRHSA-2019:351705.11.2019
Red Hat Enterprise Linux 8.0 Update Services for SAP SolutionskernelFixedRHSA-2020:020422.01.2020
Red Hat Enterprise MRG 2kernel-rtFixedRHSA-2019:273011.09.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=1660375kernel: nfs: use-after-free in svc_process_common()

EPSS

Процентиль: 29%
0.001
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 8
ubuntu
больше 6 лет назад

A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.

CVSS3: 8
nvd
больше 6 лет назад

A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.

CVSS3: 8
debian
больше 6 лет назад

A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares ...

suse-cvrf
больше 6 лет назад

Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP2)

suse-cvrf
больше 6 лет назад

Security update for the Linux Kernel (Live Patch 35 for SLE 12)

EPSS

Процентиль: 29%
0.001
Низкий

6.5 Medium

CVSS3