GHSA-H4FX-7429-JVF7
Vulnerability from github – Published: 2022-05-24 16:51 – Updated: 2022-05-24 16:51
VLAI?
Details
A flaw was found in the Linux kernel's NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.
Severity ?
7.5 (High)
{
"affected": [],
"aliases": [
"CVE-2018-16871"
],
"database_specific": {
"cwe_ids": [
"CWE-476"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-07-30T17:15:00Z",
"severity": "HIGH"
},
"details": "A flaw was found in the Linux kernel\u0027s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.",
"id": "GHSA-h4fx-7429-jvf7",
"modified": "2022-05-24T16:51:41Z",
"published": "2022-05-24T16:51:41Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:1873"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:1891"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:2696"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:2730"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2020:0740"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2020:1567"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2020:1769"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2018-16871"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16871"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20211004-0002"
},
{
"type": "WEB",
"url": "https://support.f5.com/csp/article/K18657134"
},
{
"type": "WEB",
"url": "https://support.f5.com/csp/article/K18657134?utm_source=f5support\u0026amp%3Butm_medium=RSS"
},
{
"type": "WEB",
"url": "https://support.f5.com/csp/article/K18657134?utm_source=f5support\u0026amp;utm_medium=RSS"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…