You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.
CVE-2018-16884 - High Severity Vulnerability
Vulnerable Libraries - linuxv3.10, linuxlinux-3.13.5
Vulnerability Details
A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.
Publish Date: 2018-12-18
URL: CVE-2018-16884
CVSS 3 Score Details (8.0)
Base Score Metrics:
Suggested Fix
Type: Change files
Origin: torvalds/linux@d4b09ac#diff-976c52e84334e5a1dc6391ee4bc36d3e
Release Date: 2018-12-28
Fix Resolution: Replace or update the following files: svc.c, svc.h, svcsock.c, svc_xprt.c, sunrpc.h
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: