CVE-2017-18203

The dm_get_from_kobject function in drivers/md/dm.c in the Linux kernel before 4.14.3 allow local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices.
References
Link Resource
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b9a41d21dceadf8104812626ef85dc56ee8a60ed Patch Vendor Advisory
http://www.securityfocus.com/bid/103184 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:1062
https://access.redhat.com/errata/RHSA-2018:1854
https://access.redhat.com/errata/RHSA-2019:4154
https://github.com/torvalds/linux/commit/b9a41d21dceadf8104812626ef85dc56ee8a60ed Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3653-1/
https://usn.ubuntu.com/3653-2/
https://usn.ubuntu.com/3655-1/
https://usn.ubuntu.com/3655-2/
https://usn.ubuntu.com/3657-1/
https://www.debian.org/security/2018/dsa-4187
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.3 Release Notes Vendor Advisory
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b9a41d21dceadf8104812626ef85dc56ee8a60ed Patch Vendor Advisory
http://www.securityfocus.com/bid/103184 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:1062
https://access.redhat.com/errata/RHSA-2018:1854
https://access.redhat.com/errata/RHSA-2019:4154
https://github.com/torvalds/linux/commit/b9a41d21dceadf8104812626ef85dc56ee8a60ed Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3653-1/
https://usn.ubuntu.com/3653-2/
https://usn.ubuntu.com/3655-1/
https://usn.ubuntu.com/3655-2/
https://usn.ubuntu.com/3657-1/
https://www.debian.org/security/2018/dsa-4187
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.3 Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:19

Type Values Removed Values Added
References () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b9a41d21dceadf8104812626ef85dc56ee8a60ed - Patch, Vendor Advisory () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b9a41d21dceadf8104812626ef85dc56ee8a60ed - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/103184 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/103184 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2018:0676 - () https://access.redhat.com/errata/RHSA-2018:0676 -
References () https://access.redhat.com/errata/RHSA-2018:1062 - () https://access.redhat.com/errata/RHSA-2018:1062 -
References () https://access.redhat.com/errata/RHSA-2018:1854 - () https://access.redhat.com/errata/RHSA-2018:1854 -
References () https://access.redhat.com/errata/RHSA-2019:4154 - () https://access.redhat.com/errata/RHSA-2019:4154 -
References () https://github.com/torvalds/linux/commit/b9a41d21dceadf8104812626ef85dc56ee8a60ed - Patch, Third Party Advisory () https://github.com/torvalds/linux/commit/b9a41d21dceadf8104812626ef85dc56ee8a60ed - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html - () https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html -
References () https://usn.ubuntu.com/3619-1/ - () https://usn.ubuntu.com/3619-1/ -
References () https://usn.ubuntu.com/3619-2/ - () https://usn.ubuntu.com/3619-2/ -
References () https://usn.ubuntu.com/3653-1/ - () https://usn.ubuntu.com/3653-1/ -
References () https://usn.ubuntu.com/3653-2/ - () https://usn.ubuntu.com/3653-2/ -
References () https://usn.ubuntu.com/3655-1/ - () https://usn.ubuntu.com/3655-1/ -
References () https://usn.ubuntu.com/3655-2/ - () https://usn.ubuntu.com/3655-2/ -
References () https://usn.ubuntu.com/3657-1/ - () https://usn.ubuntu.com/3657-1/ -
References () https://www.debian.org/security/2018/dsa-4187 - () https://www.debian.org/security/2018/dsa-4187 -
References () https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.3 - Release Notes, Vendor Advisory () https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.3 - Release Notes, Vendor Advisory

Information

Published : 2018-02-27 20:29

Updated : 2024-11-21 03:19


NVD link : CVE-2017-18203

Mitre link : CVE-2017-18203

CVE.ORG link : CVE-2017-18203


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')