Upstream information

CVE-2018-1000204 at MITRE

Description

** DISPUTED ** Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it "virtually impossible to exploit."

SUSE information

Overall state of this security issue: Running

This issue is currently rated as having moderate severity.

CVSS v3 Scores
  SUSE
Base Score 6.2
Vector AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Access Vector Local
Access Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Impact High
Integrity Impact None
Availability Impact None
SUSE Bugzilla entry: 1096728 [NEW]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
Openstack Cloud Magnum Orchestration 7
  • kernel-default >= 4.4.121-92.85.1
Patchnames:
SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1251
SUSE Enterprise Storage 4
  • kernel-default >= 4.4.121-92.85.1
  • kernel-default-base >= 4.4.121-92.85.1
  • kernel-default-devel >= 4.4.121-92.85.1
  • kernel-devel >= 4.4.121-92.85.1
  • kernel-macros >= 4.4.121-92.85.1
  • kernel-source >= 4.4.121-92.85.1
  • kernel-syms >= 4.4.121-92.85.1
  • kgraft-patch-4_4_121-92_85-default >= 1-3.5.1
  • kgraft-patch-SLE12-SP2_Update_23 >= 1-3.5.1
Patchnames:
SUSE-Storage-4-2018-1251
SUSE Linux Enterprise Module for Public Cloud 12
  • kernel-ec2 >= 3.12.61-52.136.1
  • kernel-ec2-devel >= 3.12.61-52.136.1
  • kernel-ec2-extra >= 3.12.61-52.136.1
Patchnames:
SUSE-SLE-Module-Public-Cloud-12-2018-1183
SUSE-SLE-Module-Public-Cloud-12-2018-1184
SUSE Linux Enterprise Point of Sale 12 SP2-CLIENT
  • kernel-default >= 4.4.121-92.85.1
  • kernel-default-base >= 4.4.121-92.85.1
  • kernel-default-devel >= 4.4.121-92.85.1
  • kernel-devel >= 4.4.121-92.85.1
  • kernel-macros >= 4.4.121-92.85.1
  • kernel-source >= 4.4.121-92.85.1
  • kernel-syms >= 4.4.121-92.85.1
  • kgraft-patch-4_4_121-92_85-default >= 1-3.5.1
  • kgraft-patch-SLE12-SP2_Update_23 >= 1-3.5.1
Patchnames:
SUSE-SLE-POS-12-SP2-CLIENT-2018-1251
SUSE Linux Enterprise Server 12 SP1-LTSS
  • kernel-default >= 3.12.74-60.64.96.1
  • kernel-default-base >= 3.12.74-60.64.96.1
  • kernel-default-devel >= 3.12.74-60.64.96.1
  • kernel-default-man >= 3.12.74-60.64.96.1
  • kernel-devel >= 3.12.74-60.64.96.1
  • kernel-macros >= 3.12.74-60.64.96.1
  • kernel-source >= 3.12.74-60.64.96.1
  • kernel-syms >= 3.12.74-60.64.96.1
  • kernel-xen >= 3.12.74-60.64.96.1
  • kernel-xen-base >= 3.12.74-60.64.96.1
  • kernel-xen-devel >= 3.12.74-60.64.96.1
  • kgraft-patch-3_12_74-60_64_96-default >= 1-2.3.1
  • kgraft-patch-3_12_74-60_64_96-xen >= 1-2.3.1
  • kgraft-patch-SLE12-SP1_Update_29 >= 1-2.3.1
Patchnames:
SUSE-SLE-SERVER-12-SP1-2018-1183
SUSE Linux Enterprise Server 12 SP2-LTSS
  • kernel-default >= 4.4.121-92.85.1
  • kernel-default-base >= 4.4.121-92.85.1
  • kernel-default-devel >= 4.4.121-92.85.1
  • kernel-default-man >= 4.4.121-92.85.1
  • kernel-devel >= 4.4.121-92.85.1
  • kernel-macros >= 4.4.121-92.85.1
  • kernel-source >= 4.4.121-92.85.1
  • kernel-syms >= 4.4.121-92.85.1
  • kgraft-patch-4_4_121-92_85-default >= 1-3.5.1
  • kgraft-patch-SLE12-SP2_Update_23 >= 1-3.5.1
Patchnames:
SUSE-SLE-SERVER-12-SP2-2018-1251
SUSE Linux Enterprise Server 12-LTSS
  • kernel-default >= 3.12.61-52.136.1
  • kernel-default-base >= 3.12.61-52.136.1
  • kernel-default-devel >= 3.12.61-52.136.1
  • kernel-default-man >= 3.12.61-52.136.1
  • kernel-devel >= 3.12.61-52.136.1
  • kernel-macros >= 3.12.61-52.136.1
  • kernel-source >= 3.12.61-52.136.1
  • kernel-syms >= 3.12.61-52.136.1
  • kernel-xen >= 3.12.61-52.136.1
  • kernel-xen-base >= 3.12.61-52.136.1
  • kernel-xen-devel >= 3.12.61-52.136.1
  • kgraft-patch-3_12_61-52_136-default >= 1-1.3.1
  • kgraft-patch-3_12_61-52_136-xen >= 1-1.3.1
  • kgraft-patch-SLE12_Update_36 >= 1-1.3.1
Patchnames:
SUSE-SLE-SERVER-12-2018-1184
SUSE Linux Enterprise Server for SAP Applications 12 SP1
  • kernel-default >= 3.12.74-60.64.96.1
  • kernel-default-base >= 3.12.74-60.64.96.1
  • kernel-default-devel >= 3.12.74-60.64.96.1
  • kernel-devel >= 3.12.74-60.64.96.1
  • kernel-macros >= 3.12.74-60.64.96.1
  • kernel-source >= 3.12.74-60.64.96.1
  • kernel-syms >= 3.12.74-60.64.96.1
  • kernel-xen >= 3.12.74-60.64.96.1
  • kernel-xen-base >= 3.12.74-60.64.96.1
  • kernel-xen-devel >= 3.12.74-60.64.96.1
  • kgraft-patch-3_12_74-60_64_96-default >= 1-2.3.1
  • kgraft-patch-3_12_74-60_64_96-xen >= 1-2.3.1
  • kgraft-patch-SLE12-SP1_Update_29 >= 1-2.3.1
Patchnames:
SUSE-SLE-SAP-12-SP1-2018-1183
SUSE Linux Enterprise Server for SAP Applications 12 SP1-LTSS
  • kernel-default >= 3.12.74-60.64.96.1
  • kernel-default-base >= 3.12.74-60.64.96.1
  • kernel-default-devel >= 3.12.74-60.64.96.1
  • kernel-default-man >= 3.12.74-60.64.96.1
  • kernel-devel >= 3.12.74-60.64.96.1
  • kernel-macros >= 3.12.74-60.64.96.1
  • kernel-source >= 3.12.74-60.64.96.1
  • kernel-syms >= 3.12.74-60.64.96.1
  • kernel-xen >= 3.12.74-60.64.96.1
  • kernel-xen-base >= 3.12.74-60.64.96.1
  • kernel-xen-devel >= 3.12.74-60.64.96.1
  • kgraft-patch-3_12_74-60_64_96-default >= 1-2.3.1
  • kgraft-patch-3_12_74-60_64_96-xen >= 1-2.3.1
  • kgraft-patch-SLE12-SP1_Update_29 >= 1-2.3.1
Patchnames:
SUSE-SLE-SERVER-12-SP1-2018-1183
SUSE Linux Enterprise Server for SAP Applications 12 SP2
  • kernel-default >= 4.4.121-92.85.1
  • kernel-default-base >= 4.4.121-92.85.1
  • kernel-default-devel >= 4.4.121-92.85.1
  • kernel-devel >= 4.4.121-92.85.1
  • kernel-macros >= 4.4.121-92.85.1
  • kernel-source >= 4.4.121-92.85.1
  • kernel-syms >= 4.4.121-92.85.1
  • kgraft-patch-4_4_121-92_85-default >= 1-3.5.1
  • kgraft-patch-SLE12-SP2_Update_23 >= 1-3.5.1
Patchnames:
SUSE-SLE-SAP-12-SP2-2018-1251
SUSE Linux Enterprise Server for SAP Applications 12 SP2-LTSS
  • kernel-default >= 4.4.121-92.85.1
  • kernel-default-base >= 4.4.121-92.85.1
  • kernel-default-devel >= 4.4.121-92.85.1
  • kernel-default-man >= 4.4.121-92.85.1
  • kernel-devel >= 4.4.121-92.85.1
  • kernel-macros >= 4.4.121-92.85.1
  • kernel-source >= 4.4.121-92.85.1
  • kernel-syms >= 4.4.121-92.85.1
  • kgraft-patch-4_4_121-92_85-default >= 1-3.5.1
  • kgraft-patch-SLE12-SP2_Update_23 >= 1-3.5.1
Patchnames:
SUSE-SLE-SERVER-12-SP2-2018-1251
SUSE Linux Enterprise Server for SAP Applications 12-LTSS
  • kernel-default >= 3.12.61-52.136.1
  • kernel-default-base >= 3.12.61-52.136.1
  • kernel-default-devel >= 3.12.61-52.136.1
  • kernel-default-man >= 3.12.61-52.136.1
  • kernel-devel >= 3.12.61-52.136.1
  • kernel-macros >= 3.12.61-52.136.1
  • kernel-source >= 3.12.61-52.136.1
  • kernel-syms >= 3.12.61-52.136.1
  • kernel-xen >= 3.12.61-52.136.1
  • kernel-xen-base >= 3.12.61-52.136.1
  • kernel-xen-devel >= 3.12.61-52.136.1
  • kgraft-patch-3_12_61-52_136-default >= 1-1.3.1
  • kgraft-patch-3_12_61-52_136-xen >= 1-1.3.1
  • kgraft-patch-SLE12_Update_36 >= 1-1.3.1
Patchnames:
SUSE-SLE-SERVER-12-2018-1184
SUSE OpenStack Cloud 7
  • kernel-default >= 4.4.121-92.85.1
  • kernel-default-base >= 4.4.121-92.85.1
  • kernel-default-devel >= 4.4.121-92.85.1
  • kernel-default-man >= 4.4.121-92.85.1
  • kernel-devel >= 4.4.121-92.85.1
  • kernel-macros >= 4.4.121-92.85.1
  • kernel-source >= 4.4.121-92.85.1
  • kernel-syms >= 4.4.121-92.85.1
  • kgraft-patch-4_4_121-92_85-default >= 1-3.5.1
  • kgraft-patch-SLE12-SP2_Update_23 >= 1-3.5.1
Patchnames:
SUSE-OpenStack-Cloud-7-2018-1251


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
SUSE Linux Enterprise Desktop 12 SP3 kernel-source Affected
SUSE Linux Enterprise Server 11 SP4 kernel-source Affected
SUSE Linux Enterprise Server 12 GA LTSS kernel-source Released
SUSE Linux Enterprise Server 12 SP1 LTSS kernel-source Released
SUSE Linux Enterprise Server 12 SP2 LTSS kernel-source Released
SUSE Linux Enterprise Server 12 SP3 kernel-source Affected