Description
Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it "virtually impossible to exploit.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1422-1 | linux security update |
Debian DLA |
DLA-1422-2 | linux security update |
Debian DLA |
DLA-1423-1 | linux-4.9 new package |
Ubuntu USN |
USN-3696-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3696-2 | Linux kernel (Xenial HWE) vulnerabilities |
Ubuntu USN |
USN-3752-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3752-2 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-3752-3 | Linux kernel (Azure, GCP, OEM) vulnerabilities |
Ubuntu USN |
USN-3754-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T12:40:46.834Z
Reserved: 2018-06-08T00:00:00.000Z
Link: CVE-2018-1000204
No data.
Status : Modified
Published: 2018-06-26T14:29:02.160
Modified: 2024-11-21T03:39:55.860
Link: CVE-2018-1000204
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Ubuntu USN