{"id":"CVE-2018-7757","details":"Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file.","modified":"2026-03-15T22:28:40.643106Z","published":"2018-03-08T14:29:00.567Z","related":["SUSE-SU-2018:1080-1","SUSE-SU-2018:1172-1","SUSE-SU-2018:1220-1","SUSE-SU-2018:1221-1","SUSE-SU-2018:1309-1","SUSE-SU-2018:3003-1","SUSE-SU-2018:3004-1","SUSE-SU-2018:3084-1","SUSE-SU-2018:3659-1","SUSE-SU-2019:0095-1"],"references":[{"type":"WEB","url":"https://usn.ubuntu.com/3654-2/"},{"type":"WEB","url":"https://usn.ubuntu.com/3698-2/"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html"},{"type":"WEB","url":"https://usn.ubuntu.com/3697-2/"},{"type":"WEB","url":"https://usn.ubuntu.com/3698-1/"},{"type":"WEB","url":"https://usn.ubuntu.com/3654-1/"},{"type":"WEB","url":"https://usn.ubuntu.com/3656-1/"},{"type":"WEB","url":"https://usn.ubuntu.com/3697-1/"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/103348"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2948"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3096"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4187"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4188"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3083"},{"type":"FIX","url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4a491b1ab11ca0556d2fda1ff1301e862a2d44c4"},{"type":"FIX","url":"https://github.com/torvalds/linux/commit/4a491b1ab11ca0556d2fda1ff1301e862a2d44c4"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-7757.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.15.7"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}