vulnerability

Ubuntu: (Multiple Advisories) (CVE-2018-16884): Linux kernel vulnerabilities

Severity
7
CVSS
(AV:A/AC:L/Au:S/C:P/I:P/A:C)
Published
Dec 18, 2018
Added
Apr 9, 2019
Modified
Nov 27, 2024

Description

A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.

Solution(s)

ubuntu-upgrade-linux-image-4-15-0-1013-oracleubuntu-upgrade-linux-image-4-15-0-1032-gcpubuntu-upgrade-linux-image-4-15-0-1034-kvmubuntu-upgrade-linux-image-4-15-0-1036-raspi2ubuntu-upgrade-linux-image-4-15-0-1038-oemubuntu-upgrade-linux-image-4-15-0-1039-awsubuntu-upgrade-linux-image-4-15-0-1045-azureubuntu-upgrade-linux-image-4-15-0-1053-snapdragonubuntu-upgrade-linux-image-4-15-0-50-genericubuntu-upgrade-linux-image-4-15-0-50-generic-lpaeubuntu-upgrade-linux-image-4-15-0-50-lowlatencyubuntu-upgrade-linux-image-4-18-0-1011-gcpubuntu-upgrade-linux-image-4-18-0-1012-kvmubuntu-upgrade-linux-image-4-18-0-1014-raspi2ubuntu-upgrade-linux-image-4-18-0-1016-awsubuntu-upgrade-linux-image-4-18-0-1018-azureubuntu-upgrade-linux-image-4-18-0-20-genericubuntu-upgrade-linux-image-4-18-0-20-generic-lpaeubuntu-upgrade-linux-image-4-18-0-20-lowlatencyubuntu-upgrade-linux-image-4-18-0-20-snapdragonubuntu-upgrade-linux-image-4-4-0-1040-awsubuntu-upgrade-linux-image-4-4-0-1043-kvmubuntu-upgrade-linux-image-4-4-0-1079-awsubuntu-upgrade-linux-image-4-4-0-1106-raspi2ubuntu-upgrade-linux-image-4-4-0-1110-snapdragonubuntu-upgrade-linux-image-4-4-0-144-genericubuntu-upgrade-linux-image-4-4-0-144-generic-lpaeubuntu-upgrade-linux-image-4-4-0-144-lowlatencyubuntu-upgrade-linux-image-4-4-0-144-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-144-powerpc-smpubuntu-upgrade-linux-image-4-4-0-144-powerpc64-embubuntu-upgrade-linux-image-4-4-0-144-powerpc64-smpubuntu-upgrade-linux-image-4-4-0-145-genericubuntu-upgrade-linux-image-4-4-0-145-generic-lpaeubuntu-upgrade-linux-image-4-4-0-145-lowlatencyubuntu-upgrade-linux-image-4-4-0-145-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-145-powerpc-smpubuntu-upgrade-linux-image-4-4-0-145-powerpc64-embubuntu-upgrade-linux-image-4-4-0-145-powerpc64-smpubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-hwe-18-04ubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-lts-xenial
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.