vulnerability
Ubuntu: (Multiple Advisories) (CVE-2018-16884): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:A/AC:L/Au:S/C:P/I:P/A:C) | Dec 18, 2018 | Apr 9, 2019 | Nov 27, 2024 |
Severity
7
CVSS
(AV:A/AC:L/Au:S/C:P/I:P/A:C)
Published
Dec 18, 2018
Added
Apr 9, 2019
Modified
Nov 27, 2024
Description
A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.
Solution(s)
ubuntu-upgrade-linux-image-4-15-0-1013-oracleubuntu-upgrade-linux-image-4-15-0-1032-gcpubuntu-upgrade-linux-image-4-15-0-1034-kvmubuntu-upgrade-linux-image-4-15-0-1036-raspi2ubuntu-upgrade-linux-image-4-15-0-1038-oemubuntu-upgrade-linux-image-4-15-0-1039-awsubuntu-upgrade-linux-image-4-15-0-1045-azureubuntu-upgrade-linux-image-4-15-0-1053-snapdragonubuntu-upgrade-linux-image-4-15-0-50-genericubuntu-upgrade-linux-image-4-15-0-50-generic-lpaeubuntu-upgrade-linux-image-4-15-0-50-lowlatencyubuntu-upgrade-linux-image-4-18-0-1011-gcpubuntu-upgrade-linux-image-4-18-0-1012-kvmubuntu-upgrade-linux-image-4-18-0-1014-raspi2ubuntu-upgrade-linux-image-4-18-0-1016-awsubuntu-upgrade-linux-image-4-18-0-1018-azureubuntu-upgrade-linux-image-4-18-0-20-genericubuntu-upgrade-linux-image-4-18-0-20-generic-lpaeubuntu-upgrade-linux-image-4-18-0-20-lowlatencyubuntu-upgrade-linux-image-4-18-0-20-snapdragonubuntu-upgrade-linux-image-4-4-0-1040-awsubuntu-upgrade-linux-image-4-4-0-1043-kvmubuntu-upgrade-linux-image-4-4-0-1079-awsubuntu-upgrade-linux-image-4-4-0-1106-raspi2ubuntu-upgrade-linux-image-4-4-0-1110-snapdragonubuntu-upgrade-linux-image-4-4-0-144-genericubuntu-upgrade-linux-image-4-4-0-144-generic-lpaeubuntu-upgrade-linux-image-4-4-0-144-lowlatencyubuntu-upgrade-linux-image-4-4-0-144-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-144-powerpc-smpubuntu-upgrade-linux-image-4-4-0-144-powerpc64-embubuntu-upgrade-linux-image-4-4-0-144-powerpc64-smpubuntu-upgrade-linux-image-4-4-0-145-genericubuntu-upgrade-linux-image-4-4-0-145-generic-lpaeubuntu-upgrade-linux-image-4-4-0-145-lowlatencyubuntu-upgrade-linux-image-4-4-0-145-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-145-powerpc-smpubuntu-upgrade-linux-image-4-4-0-145-powerpc64-embubuntu-upgrade-linux-image-4-4-0-145-powerpc64-smpubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-hwe-18-04ubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-lts-xenial
References
- CVE-2018-16884
- https://attackerkb.com/topics/CVE-2018-16884
- NVD-CVE-2018-16884
- UBUNTU-USN-3932-1
- UBUNTU-USN-3932-2
- UBUNTU-USN-3977-1
- UBUNTU-USN-3977-2
- UBUNTU-USN-3977-3
- UBUNTU-USN-3978-1
- UBUNTU-USN-3979-1
- UBUNTU-USN-3980-1
- UBUNTU-USN-3980-2
- UBUNTU-USN-3981-1
- UBUNTU-USN-3981-2
- UBUNTU-USN-3982-1
- UBUNTU-USN-3982-2
- UBUNTU-USN-3983-1
- UBUNTU-USN-3983-2
- UBUNTU-USN-3984-1
- UBUNTU-USN-3985-1
- UBUNTU-USN-3985-2
- UBUNTU-USN-4076-1
- UBUNTU-USN-4095-1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.