CVE-2018-11768
Description
In Apache Hadoop 3.1.0 to 3.1.1, 3.0.0-alpha1 to 3.0.3, 2.9.0 to 2.9.1, and 2.0.0-alpha to 2.8.4, the user/group information can be corrupted across storing in fsimage and reading back from fsimage.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache Hadoop user/group metadata corruption between fsimage write and read leads to potential privilege mismanagement.
Vulnerability
Description
CVE-2018-11768 is an information integrity flaw in Apache Hadoop affecting versions 3.1.0 to 3.1.1, 3.0.0-alpha1 to 3.0.3, 2.9.0 to 2.9.1, and 2.0.0-alpha to 2.8.4. The root cause lies in how the NameNode serializes UserGroupInformation (UGI) data when writing the filesystem image (fsimage) and subsequently deserializes it upon restart or checkpoint loading. A corruption in the stored user/group mappings can occur, meaning that when the system reads the fsimage back, the permissions associated with files and directories may be attributed to the wrong users or groups [1][2].
Attack
Vector and Prerequisites
No specific exploit code or authentication bypass is described; the vulnerability is triggered internally during normal Hadoop operations—specifically when the NameNode persists its metadata. An attacker does not directly interact with the fsimage corruption; rather, the corruption arises from a software defect in the serialization/deserialization logic. However, if an adversary can control which files or directories are created (e.g., by submitting jobs that create data under a controlled identity), they might influence the metadata that becomes corrupted, potentially aligning the outcome with their goals. No network privileges beyond standard access to the HDFS cluster are required, though the corruption affects all filesystem operations post-restart [2].
Impact
A successful corruption of user/group information can lead to two serious outcomes: (1) a user may gain unauthorized access to files or directories that should have been owned by another user, effectively bypassing access control lists; (2) an administrator or automated tool may see incorrect ownership, leading to misconfiguration or security misjudgments. Because HDFS relies on Linux-like POSIX permissions (user, group, others), a corrupt UGI mapping can result in privilege escalations or data leakage, depending on the specific permissions applied to the affected inodes. The impact is primarily on data confidentiality and integrity, as the corrupted metadata may persist until manually corrected [2].
Mitigation
Status
The vulnerability is fully patched in Apache Hadoop 3.2.0 and later, 3.1.2, 2.9.2, and 2.8.5. Users running any of the impacted versions should upgrade to these fixed releases. No workaround other than upgrading is documented; admins should also audit the current fsimage for any inconsistent UGI entries after upgrade. The issue has not been listed on CISA’s Known Exploited Vulnerabilities (KEV) catalog as of the last check [1][2].
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.hadoop:hadoop-mainMaven | >= 2.2.0, < 2.8.5 | 2.8.5 |
org.apache.hadoop:hadoop-mainMaven | >= 2.9.0, < 2.9.2 | 2.9.2 |
org.apache.hadoop:hadoop-mainMaven | >= 3.0.0, < 3.1.1 | 3.1.1 |
Affected products
2- Apache/Hadoopdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
23- github.com/advisories/GHSA-hx83-rpqf-m267ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2018-11768ghsaADVISORY
- hadoop.apache.org/cve_list.htmlghsaWEB
- lists.apache.org/thread.html/2067a797b330530a6932f4b08f703b3173253d0a2b7c8c524e54adaf%40%3Cgeneral.hadoop.apache.org%3Emitrex_refsource_MISC
- lists.apache.org/thread.html/2067a797b330530a6932f4b08f703b3173253d0a2b7c8c524e54adaf@%3Cgeneral.hadoop.apache.org%3EghsaWEB
- lists.apache.org/thread.html/2c9cc65864be0058a5d5ed2025dfb9c700bf23d352b0c826c36ff96a%40%3Chdfs-dev.hadoop.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/2c9cc65864be0058a5d5ed2025dfb9c700bf23d352b0c826c36ff96a@%3Chdfs-dev.hadoop.apache.org%3EghsaWEB
- lists.apache.org/thread.html/72ca514e01cd5f08151e74f9929799b4cbe1b6e9e6cd24faa72ffcc6%40%3Cdev.lucene.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/72ca514e01cd5f08151e74f9929799b4cbe1b6e9e6cd24faa72ffcc6@%3Cdev.lucene.apache.org%3EghsaWEB
- lists.apache.org/thread.html/9b609d4392d886711e694cf40d86f770022baf42a1b1aa97e8244c87%40%3Cdev.lucene.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/9b609d4392d886711e694cf40d86f770022baf42a1b1aa97e8244c87@%3Cdev.lucene.apache.org%3EghsaWEB
- lists.apache.org/thread.html/caacbbba2dcc1105163f76f3dfee5fbd22e0417e0783212787086378%40%3Cgeneral.hadoop.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/caacbbba2dcc1105163f76f3dfee5fbd22e0417e0783212787086378@%3Cgeneral.hadoop.apache.org%3EghsaWEB
- lists.apache.org/thread.html/ceb16af9139ab0fea24aef935b6321581976887df7ad632e9a515dda%40%3Cdev.lucene.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/ceb16af9139ab0fea24aef935b6321581976887df7ad632e9a515dda@%3Cdev.lucene.apache.org%3EghsaWEB
- lists.apache.org/thread.html/ea6d2dfbefab8ebe46be18b05136b83ae53b7866f1bc60c680a2b600%40%3Chdfs-dev.hadoop.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/ea6d2dfbefab8ebe46be18b05136b83ae53b7866f1bc60c680a2b600@%3Chdfs-dev.hadoop.apache.org%3EghsaWEB
- lists.apache.org/thread.html/f20bb4e055d8394fc525cc7772fb84096f706389043e76220c8a29a4%40%3Chdfs-dev.hadoop.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/f20bb4e055d8394fc525cc7772fb84096f706389043e76220c8a29a4@%3Chdfs-dev.hadoop.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb%40%3Cdev.flink.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb%40%3Cuser.flink.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb@%3Cdev.flink.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb@%3Cuser.flink.apache.org%3EghsaWEB
News mentions
0No linked articles in our index yet.