Логотип exploitDog
bind:CVE-2018-1000204
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-1000204

Количество 20

Количество 20

ubuntu логотип

CVE-2018-1000204

почти 7 лет назад

** DISPUTED ** Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it "virtually impossible to exploit."

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2018-1000204

около 7 лет назад

Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it "virtually impossible to exploit.

CVSS3: 4.1
EPSS: Низкий
nvd логотип

CVE-2018-1000204

почти 7 лет назад

Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it "virtually impossible to exploit.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2018-1000204

почти 7 лет назад

Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl o ...

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-xrfx-4wv5-78ww

около 3 лет назад

** DISPUTED ** Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it "virtually impossible to exploit."

CVSS3: 5.3
EPSS: Низкий
oracle-oval логотип

ELSA-2018-4288

больше 6 лет назад

ELSA-2018-4288: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2018-4301

больше 6 лет назад

ELSA-2018-4301: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1245-1

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1762-1

около 7 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1761-1

около 7 лет назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2018-4300

больше 6 лет назад

ELSA-2018-4300: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2637-1

почти 7 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2366-1

почти 7 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2332-1

почти 7 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1407-1

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1855-2

больше 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1855-1

почти 7 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2092-1

почти 7 лет назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4316

больше 6 лет назад

ELSA-2019-4316: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:2119-1

почти 7 лет назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-1000204

** DISPUTED ** Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it "virtually impossible to exploit."

CVSS3: 5.3
0%
Низкий
почти 7 лет назад
redhat логотип
CVE-2018-1000204

Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it "virtually impossible to exploit.

CVSS3: 4.1
0%
Низкий
около 7 лет назад
nvd логотип
CVE-2018-1000204

Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it "virtually impossible to exploit.

CVSS3: 5.3
0%
Низкий
почти 7 лет назад
debian логотип
CVE-2018-1000204

Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl o ...

CVSS3: 5.3
0%
Низкий
почти 7 лет назад
github логотип
GHSA-xrfx-4wv5-78ww

** DISPUTED ** Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it "virtually impossible to exploit."

CVSS3: 5.3
0%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2018-4288

ELSA-2018-4288: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 6 лет назад
oracle-oval логотип
ELSA-2018-4301

ELSA-2018-4301: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1245-1

Security update for the Linux Kernel

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2018:1762-1

Security update for the Linux Kernel

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:1761-1

Security update for the Linux Kernel

около 7 лет назад
oracle-oval логотип
ELSA-2018-4300

ELSA-2018-4300: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2018:2637-1

Security update for the Linux Kernel

почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:2366-1

Security update for the Linux Kernel

почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:2332-1

Security update for the Linux Kernel

почти 7 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1407-1

Security update for the Linux Kernel

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2018:1855-2

Security update for the Linux Kernel

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2018:1855-1

Security update for the Linux Kernel

почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:2092-1

Security update for the Linux Kernel

почти 7 лет назад
oracle-oval логотип
ELSA-2019-4316

ELSA-2019-4316: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2018:2119-1

Security update for the Linux Kernel

почти 7 лет назад

Уязвимостей на страницу