Description
In the Linux kernel through 4.14.13, drivers/block/loop.c mishandles lo_release serialization, which allows attackers to cause a denial of service (__lock_acquire use-after-free) or possibly have unspecified other impact.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-17123 | In the Linux kernel through 4.14.13, drivers/block/loop.c mishandles lo_release serialization, which allows attackers to cause a denial of service (__lock_acquire use-after-free) or possibly have unspecified other impact. |
Ubuntu USN |
USN-3583-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3583-2 | Linux kernel (Trusty HWE) vulnerabilities |
Ubuntu USN |
USN-3617-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3617-2 | Linux (HWE) vulnerabilities |
Ubuntu USN |
USN-3617-3 | Linux kernel (Raspberry Pi 2) vulnerabilities |
Ubuntu USN |
USN-3619-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3619-2 | Linux kernel (Xenial HWE) vulnerabilities |
Ubuntu USN |
USN-3632-1 | Linux kernel (Azure) vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T05:33:43.863Z
Reserved: 2018-01-11T00:00:00.000Z
Link: CVE-2018-5344
No data.
Status : Modified
Published: 2018-01-12T09:29:00.540
Modified: 2024-11-21T04:08:37.580
Link: CVE-2018-5344
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN