First published: Tue Sep 25 2018(Updated: )
A flaw was found in the Linux kernel’s implementation of the SAS expander subsystem, where a race condition exists in the smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c. An attacker could abuse this flaw to corrupt memory and escalate privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1160.rt56.1131.el7 | 0:3.10.0-1160.rt56.1131.el7 |
redhat/kernel | <0:3.10.0-1160.el7 | 0:3.10.0-1160.el7 |
redhat/kernel | <0:3.10.0-957.65.1.el7 | 0:3.10.0-957.65.1.el7 |
redhat/kernel | <0:3.10.0-1062.43.1.el7 | 0:3.10.0-1062.43.1.el7 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 | |
Linux Kernel | <3.16.72 | |
Linux Kernel | >=3.17<3.18.140 | |
Linux Kernel | >=3.19<4.4.180 | |
Linux Kernel | >=4.5<4.9.175 | |
Linux Kernel | >=4.10<4.14.118 | |
Linux Kernel | >=4.15<4.19.42 | |
Ubuntu | =16.04 | |
Debian | =8.0 | |
Debian | =9.0 | |
Debian | =10.0 | |
F5 Traffix Systems Signaling Delivery Controller | =5.0.0 | |
F5 Traffix Systems Signaling Delivery Controller | =5.1.0 | |
NetApp Active IQ Unified Manager for VMware vSphere | >=9.5 | |
NetApp SnapProtect | ||
netapp solidfire \& hci management node | ||
netapp solidfire \& hci storage node | ||
NetApp Storage Replication Adapter for Clustered Data ONTAP for VMware vSphere | ||
NetApp VASA Provider | >=7.2 | |
NetApp Virtual Storage Console for VMware vSphere | >=7.2 | |
netapp hci compute node | ||
openSUSE | =15.0 | |
openSUSE | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2018-20836 is classified as a high severity vulnerability due to its potential for privilege escalation and memory corruption.
To fix CVE-2018-20836, users should update to the latest kernel version that addresses this vulnerability according to their distribution.
CVE-2018-20836 affects various versions of the Linux kernel up to version 4.19.42 as well as specific Red Hat kernel packages.
An attacker can exploit CVE-2018-20836 to potentially cause memory corruption and escalate privileges on the affected systems.
Patches for CVE-2018-20836 are available from major distributions such as Red Hat, Debian, and Ubuntu.