Bug 1077892 (CVE-2018-5750)

Summary: VUL-1: CVE-2018-5750: kernel-source: The acpi_smbus_hc_add function in drivers/acpi/sbshc.c in the Linux kernelthrough 4.14.15 allows local users to obtain sensitive address information byreading dmesg data from an SBS HC printk call.
Product: [Novell Products] SUSE Security Incidents Reporter: Marcus Meissner <meissner>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED WONTFIX QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P4 - Low CC: bpetkov, smash_bz
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/199072/
Whiteboard: CVSSv3:SUSE:CVE-2018-5750:4.0:(AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Marcus Meissner 2018-01-29 05:55:44 UTC
CVE-2018-5750

The acpi_smbus_hc_add function in drivers/acpi/sbshc.c in the Linux kernel
through 4.14.15 allows local users to obtain sensitive address information by
reading dmesg data from an SBS HC printk call.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5750
http://www.cvedetails.com/cve/CVE-2018-5750/
https://patchwork.kernel.org/patch/10174835/
Comment 1 Marcus Meissner 2018-01-29 05:59:07 UTC
kaslr break, which we do not have currently. in all kernels.
Comment 2 Borislav Petkov 2018-02-02 14:06:17 UTC
So close?
Comment 4 Marcus Meissner 2018-08-29 09:17:58 UTC
we will currently not fix such problems