Summary: | CVE-2017-18379 kernel: out of bound access in drivers/nvme/target/fc.c | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Dhananjay Arunesh <darunesh> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | acaringi, airlied, bhu, blc, brdeoliv, bskeggs, dhoward, dvlasenk, esammons, fhrbata, hdegoede, hkrzesin, iboverma, ichavero, itamar, jarodwilson, jeremy, jforbes, jglisse, jlelli, john.j5live, jonathan, josef, jross, jshortt, jstancek, jwboyer, kernel-maint, kernel-mgr, labbott, lgoncalv, linville, matt, mchehab, mcressma, mjg59, mlangsdo, nmurray, nyewale, plougher, rt-maint, rvrbovsk, steved, williams, wmealing, yozone |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in the Linux kernel’s implementation of NVME over a fiber connection. A local attacker could use this flaw to create a situation in which specially crafted requests could corrupt memory or possibly escalate privileges.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-08-15 20:47:03 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Bug Depends On: | 1735639 | ||
Bug Blocks: | 1735640 |
Description
Dhananjay Arunesh
2019-08-01 07:52:34 UTC
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1735639] This was fixed for Fedora in 4.14 and never impacted any currently supported Fedora releases. This flaw is rated as Important, it may allow a local attacker to issue an out-of-bounds write and gather information that is not intended to be accessed. This information may weaken security measures in place making it easier for subsequent attacks to succeed. Note: No current shipping versions of Red Hat Enterprise Linux are affected either by having the fix that solves that problem or not including the code that introduced the problem. This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2017-18379 |