drivers/scsi/libsas/sasscsihost.c in the Linux kernel before 4.16 allows local users to cause a denial of service (ata qc leak) by triggering certain failure conditions. NOTE: a third party disputes the relevance of this report because the failure can only occur for physically proximate attackers who unplug SAS Host Bus Adapter cables
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-10021.json"
[
{
"deprecated": false,
"signature_type": "Function",
"digest": {
"length": 200.0,
"function_hash": "151469467475051239690933666022955979162"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@318aaf34f1179b39fa9c30fa0f3288b645beee39",
"id": "CVE-2018-10021-825346fd",
"target": {
"file": "drivers/scsi/libsas/sas_scsi_host.c",
"function": "sas_eh_finish_cmd"
}
},
{
"deprecated": false,
"signature_type": "Line",
"digest": {
"line_hashes": [
"151638628694735977337006364090206591982",
"325369789704541629331342105576913032973",
"299166058762677172001984129556956511416",
"257366244120426076668998267506321059268",
"127801825418439779320782530243299003893",
"73102074058576453927229276263995121796",
"33908713621172061802927925173556740364",
"112313308691612230200674114843893398686",
"59129392796783038897841359473428785083",
"4017815943809665365321861252699658013",
"129082909730679767997053724758188848546",
"154569730655748481792586802316747318060",
"204103080102366143958200167683534019910",
"320038750549511222154886034922365998461",
"188804693075804041809048891492642447806",
"80574387245788525548616754220318931406",
"43672172818532045193350477041500027664",
"3733876550544168996821028596191166081",
"64040870537805591863253386827797863584",
"27777130889357309388248800973573659766",
"312647384905638809080502765626598434106",
"265393818703206722148011747360844541828",
"221971461577955617237525956569956047464",
"15372892776334073713254983214525772161",
"97596613890764545478724915851144736913",
"267594422621068336885464481743580915816",
"162790804543341277196464127848820141081",
"60157609258000132440623852662972636899",
"294676414455533992373612130976727310721",
"143770392860486821085997539021288257257",
"296541375086761282725837599845854316291",
"10996582240355290042706383915157797616",
"220514576511642224109895062587418443729",
"198800877389376866838756240957558528066",
"223783520892893789239796562249815222",
"308735739811234795928225519934499325670",
"46085734785243760892761280348459757243"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@318aaf34f1179b39fa9c30fa0f3288b645beee39",
"id": "CVE-2018-10021-c2893011",
"target": {
"file": "drivers/scsi/libsas/sas_scsi_host.c"
}
},
{
"deprecated": false,
"signature_type": "Function",
"digest": {
"length": 290.0,
"function_hash": "335045288926849054118311189596396616860"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@318aaf34f1179b39fa9c30fa0f3288b645beee39",
"id": "CVE-2018-10021-d57c9b73",
"target": {
"file": "drivers/scsi/libsas/sas_scsi_host.c",
"function": "sas_eh_defer_cmd"
}
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-10021.json"
[
{
"deprecated": false,
"signature_type": "Line",
"digest": {
"line_hashes": [
"151638628694735977337006364090206591982",
"325369789704541629331342105576913032973",
"299166058762677172001984129556956511416",
"257366244120426076668998267506321059268",
"127801825418439779320782530243299003893",
"73102074058576453927229276263995121796",
"33908713621172061802927925173556740364",
"112313308691612230200674114843893398686",
"59129392796783038897841359473428785083",
"4017815943809665365321861252699658013",
"129082909730679767997053724758188848546",
"154569730655748481792586802316747318060",
"204103080102366143958200167683534019910",
"320038750549511222154886034922365998461",
"188804693075804041809048891492642447806",
"80574387245788525548616754220318931406",
"43672172818532045193350477041500027664",
"3733876550544168996821028596191166081",
"64040870537805591863253386827797863584",
"27777130889357309388248800973573659766",
"312647384905638809080502765626598434106",
"265393818703206722148011747360844541828",
"221971461577955617237525956569956047464",
"15372892776334073713254983214525772161",
"97596613890764545478724915851144736913",
"267594422621068336885464481743580915816",
"162790804543341277196464127848820141081",
"60157609258000132440623852662972636899",
"294676414455533992373612130976727310721",
"143770392860486821085997539021288257257",
"296541375086761282725837599845854316291",
"10996582240355290042706383915157797616",
"220514576511642224109895062587418443729",
"198800877389376866838756240957558528066",
"223783520892893789239796562249815222",
"308735739811234795928225519934499325670",
"46085734785243760892761280348459757243"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://github.com/torvalds/linux/commit/318aaf34f1179b39fa9c30fa0f3288b645beee39",
"id": "CVE-2018-10021-4f0650ff",
"target": {
"file": "drivers/scsi/libsas/sas_scsi_host.c"
}
},
{
"deprecated": false,
"signature_type": "Function",
"digest": {
"length": 200.0,
"function_hash": "151469467475051239690933666022955979162"
},
"signature_version": "v1",
"source": "https://github.com/torvalds/linux/commit/318aaf34f1179b39fa9c30fa0f3288b645beee39",
"id": "CVE-2018-10021-79bdb5c2",
"target": {
"file": "drivers/scsi/libsas/sas_scsi_host.c",
"function": "sas_eh_finish_cmd"
}
},
{
"deprecated": false,
"signature_type": "Function",
"digest": {
"length": 290.0,
"function_hash": "335045288926849054118311189596396616860"
},
"signature_version": "v1",
"source": "https://github.com/torvalds/linux/commit/318aaf34f1179b39fa9c30fa0f3288b645beee39",
"id": "CVE-2018-10021-b3bf2729",
"target": {
"file": "drivers/scsi/libsas/sas_scsi_host.c",
"function": "sas_eh_defer_cmd"
}
}
]