Количество 20
Количество 20
GHSA-xrfx-4wv5-78ww
** DISPUTED ** Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it "virtually impossible to exploit."

CVE-2018-1000204
** DISPUTED ** Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it "virtually impossible to exploit."

CVE-2018-1000204
Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it "virtually impossible to exploit.

CVE-2018-1000204
Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it "virtually impossible to exploit.
CVE-2018-1000204
Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl o ...
ELSA-2018-4288
ELSA-2018-4288: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2018-4301
ELSA-2018-4301: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2019:1245-1
Security update for the Linux Kernel

SUSE-SU-2018:1762-1
Security update for the Linux Kernel

SUSE-SU-2018:1761-1
Security update for the Linux Kernel
ELSA-2018-4300
ELSA-2018-4300: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2018:2637-1
Security update for the Linux Kernel

SUSE-SU-2018:2366-1
Security update for the Linux Kernel

SUSE-SU-2018:2332-1
Security update for the Linux Kernel

openSUSE-SU-2019:1407-1
Security update for the Linux Kernel

SUSE-SU-2018:1855-2
Security update for the Linux Kernel

SUSE-SU-2018:1855-1
Security update for the Linux Kernel

SUSE-SU-2018:2092-1
Security update for the Linux Kernel
ELSA-2019-4316
ELSA-2019-4316: Unbreakable Enterprise kernel security update (IMPORTANT)

openSUSE-SU-2018:2119-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-xrfx-4wv5-78ww ** DISPUTED ** Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it "virtually impossible to exploit." | CVSS3: 5.3 | 0% Низкий | около 3 лет назад | |
![]() | CVE-2018-1000204 ** DISPUTED ** Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it "virtually impossible to exploit." | CVSS3: 5.3 | 0% Низкий | почти 7 лет назад |
![]() | CVE-2018-1000204 Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it "virtually impossible to exploit. | CVSS3: 4.1 | 0% Низкий | около 7 лет назад |
![]() | CVE-2018-1000204 Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it "virtually impossible to exploit. | CVSS3: 5.3 | 0% Низкий | почти 7 лет назад |
CVE-2018-1000204 Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl o ... | CVSS3: 5.3 | 0% Низкий | почти 7 лет назад | |
ELSA-2018-4288 ELSA-2018-4288: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 6 лет назад | |||
ELSA-2018-4301 ELSA-2018-4301: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 6 лет назад | |||
![]() | SUSE-SU-2019:1245-1 Security update for the Linux Kernel | около 6 лет назад | ||
![]() | SUSE-SU-2018:1762-1 Security update for the Linux Kernel | около 7 лет назад | ||
![]() | SUSE-SU-2018:1761-1 Security update for the Linux Kernel | около 7 лет назад | ||
ELSA-2018-4300 ELSA-2018-4300: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 6 лет назад | |||
![]() | SUSE-SU-2018:2637-1 Security update for the Linux Kernel | почти 7 лет назад | ||
![]() | SUSE-SU-2018:2366-1 Security update for the Linux Kernel | почти 7 лет назад | ||
![]() | SUSE-SU-2018:2332-1 Security update for the Linux Kernel | почти 7 лет назад | ||
![]() | openSUSE-SU-2019:1407-1 Security update for the Linux Kernel | около 6 лет назад | ||
![]() | SUSE-SU-2018:1855-2 Security update for the Linux Kernel | больше 6 лет назад | ||
![]() | SUSE-SU-2018:1855-1 Security update for the Linux Kernel | почти 7 лет назад | ||
![]() | SUSE-SU-2018:2092-1 Security update for the Linux Kernel | почти 7 лет назад | ||
ELSA-2019-4316 ELSA-2019-4316: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 6 лет назад | |||
![]() | openSUSE-SU-2018:2119-1 Security update for the Linux Kernel | почти 7 лет назад |
Уязвимостей на страницу