Description
A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.
Published: 2018-12-18
Score: 8.0 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-1731-1 linux security update
Debian DLA Debian DLA DLA-1731-2 linux regression update
Debian DLA Debian DLA DLA-1771-1 linux-4.9 security update
EUVD EUVD EUVD-2018-8674 A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.
Ubuntu USN Ubuntu USN USN-3932-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3932-2 Linux kernel (Xenial HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-3980-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3980-2 Linux kernel (HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-3981-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3981-2 Linux kernel (HWE) vulnerabilities
History

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.001}

epss

{'score': 0.00078}


Subscriptions

Canonical Ubuntu Linux
Debian Debian Linux
Linux Linux Kernel
Redhat Enterprise Linux Enterprise Mrg Rhel E4s Rhel Eus Rhel Extras Rt
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-05T10:32:54.149Z

Reserved: 2018-09-11T00:00:00.000Z

Link: CVE-2018-16884

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-12-18T22:29:04.713

Modified: 2024-11-21T03:53:31.757

Link: CVE-2018-16884

cve-icon Redhat

Severity : Important

Publid Date: 2018-11-27T00:00:00Z

Links: CVE-2018-16884 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses