Bug 1616374 (CVE-2018-7754)
Summary: | CVE-2018-7754 kernel: Information Exposure in aoedisk_debugfs_show function in drivers/block/aoe/aoeblk.c | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Laura Pardo <lpardo> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | abhgupta, acaringi, airlied, aquini, bhu, blc, bskeggs, dbaker, dhoward, esammons, ewk, fhrbata, hdegoede, hkrzesin, hwkernel-mgr, iboverma, ichavero, itamar, jarodwilson, jforbes, jglisse, jkacur, john.j5live, jokerman, jonathan, josef, jross, jstancek, jwboyer, kernel-maint, kernel-mgr, labbott, lgoncalv, linville, lwang, matt, mchehab, mcressma, mjg59, mlangsdo, nmurray, plougher, rt-maint, rvrbovsk, sfowler, skozina, steved, sthangav, trankin, vdronov, williams, yozone |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in the Linux kernel in that the aoedisk_debugfs_show() function in drivers/block/aoe/aoeblk.c allows local users to obtain some kernel address information by reading a debugfs file. This address is not useful to commit a further attack.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2018-08-23 11:22:08 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1616375, 1616376 | ||
Bug Blocks: | 1616377 |
Description
Laura Pardo
2018-08-15 18:24:36 UTC
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1616376] Notes: The kernel addresses revealed in the debugfs file are of the kernel objects which are allocated dynamically and does not give an information about the kernel code or the static objects location. While a possible attacker can still use a leaked address for certain purposes we assess this flaw impact as Low. |