CVE-2018-7757 (Medium) detected in linuxv3.10
mend-bolt-for-github opened this issue · comments
CVE-2018-7757 - Medium Severity Vulnerability
Vulnerable Library - linuxv3.10
Linux kernel source tree
Library home page: https://github.com/torvalds/linux.git
Found in HEAD commit: adc86a86e0ac98007fd3af905bc71e9f29c1502c
Found in base branch: xsentinel-1.7-experimental
Vulnerable Source Files (2)
android_kernel_samsung_j7elte/drivers/scsi/libsas/sas_expander.c
android_kernel_samsung_j7elte/drivers/scsi/libsas/sas_expander.c
Vulnerability Details
Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file.
Publish Date: 2018-03-08
URL: CVE-2018-7757
CVSS 3 Score Details (5.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2018-7757
Release Date: 2018-03-08
Fix Resolution: v4.16-rc1
Step up your Open Source Security Game with WhiteSource here