A flaw was found in the Linux kernel's NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
History
21 Nov 2024, 03:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/errata/RHSA-2019:2696 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2019:2730 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0740 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16871 - Issue Tracking, Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20211004-0002/ - Third Party Advisory | |
References | () https://support.f5.com/csp/article/K18657134 - Third Party Advisory | |
References | () https://support.f5.com/csp/article/K18657134?utm_source=f5support&%3Butm_medium=RSS - |
11 Apr 2022, 20:42
Type | Values Removed | Values Added |
---|---|---|
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:2730 - Third Party Advisory | |
References | (CONFIRM) https://support.f5.com/csp/article/K18657134?utm_source=f5support&utm_medium=RSS - Third Party Advisory | |
References | (CONFIRM) https://support.f5.com/csp/article/K18657134 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2020:0740 - Third Party Advisory | |
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20211004-0002/ - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:2696 - Third Party Advisory | |
CPE | cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:* cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:* cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:* cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:* cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:* |
04 Oct 2021, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2019-07-30 17:15
Updated : 2024-11-21 03:53
NVD link : CVE-2018-16871
Mitre link : CVE-2018-16871
CVE.ORG link : CVE-2018-16871
JSON object : View
Products Affected
redhat
- enterprise_linux
- enterprise_linux_server_tus
- enterprise_linux_eus
- developer_tools
- enterprise_linux_workstation
- enterprise_linux_desktop
- enterprise_linux_server_eus
- enterprise_linux_server_aus
- mrg_realtime
- enterprise_linux_server
netapp
- h300s
- h300e_firmware
- cloud_backup
- h700e_firmware
- h500e_firmware
- h700s
- h300e
- h500e
- h500s_firmware
- h500s
- h410s_firmware
- h700e
- h410c
- h410s
- h410c_firmware
- h300s_firmware
- h700s_firmware
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference