Bug 1757363 (CVE-2017-18549)
Summary: | CVE-2017-18549 kernel: information exposure in drivers/scsi/aacraid/commctrl.c | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Dhananjay Arunesh <darunesh> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | acaringi, airlied, bdettelb, bhu, blc, brdeoliv, bskeggs, dhoward, dominik.mierzejewski, dvlasenk, esammons, fhrbata, hdegoede, hkrzesin, iboverma, ichavero, itamar, jarodwilson, jeremy, jforbes, jglisse, jlelli, john.j5live, jonathan, josef, jross, jschorr, jshortt, jstancek, jwboyer, kernel-maint, kernel-mgr, labbott, lgoncalv, linville, masami256, matt, mchehab, mcressma, mjg59, mlangsdo, nmurray, plougher, rkeshri, rt-maint, rvrbovsk, steved, williams |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in the Linux kernel in the aac_send_raw_srb and aac_get_hba_info in drivers/scsi/aacraid/commctrl.c in the SCSI, where an uninitialized variable could copy stack-allocated structs to userspace without initializing its member's variables. This flaw can lead to the exposure of kernel stack memory. Clearing the memory by memset to ZERO at initialization can prevent information leaks.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-02-18 08:09:34 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1757364 | ||
Bug Blocks: | 1757365 |
Description
Dhananjay Arunesh
2019-10-01 10:34:02 UTC
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1757364] This issue was fixed in upstream kernel 4.13 and never impacted any currently supported version of Fedora. Mitigation: Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability. This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2017-18549 |