Hide Forgot
An issue was discovered in the Linux kernels implementation of SAS expander functionality. A race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c could allow an attacker who is able to issue SAS commands to create a conditon where it could be manipulated into a use-after-free scenario allowing for memory corruption or possibly escalate privileges. Upstream patch: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b90cd6f2b905905fb42671009dc0e27c310a16ae https://github.com/torvalds/linux/commit/b90cd6f2b905905fb42671009dc0e27c310a16ae
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:4062 https://access.redhat.com/errata/RHSA-2020:4062
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:4060 https://access.redhat.com/errata/RHSA-2020:4060
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-20836
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Extended Update Support Via RHSA-2020:5656 https://access.redhat.com/errata/RHSA-2020:5656
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.7 Extended Update Support Via RHSA-2021:0019 https://access.redhat.com/errata/RHSA-2021:0019