Bug 1077892 - (CVE-2018-5750) VUL-1: CVE-2018-5750: kernel-source: The acpi_smbus_hc_add function in drivers/acpi/sbshc.c in the Linux kernelthrough 4.14.15 allows local users to obtain sensitive address information byreading dmesg data from an SBS HC printk call.
(CVE-2018-5750)
VUL-1: CVE-2018-5750: kernel-source: The acpi_smbus_hc_add function in driver...
Status: RESOLVED WONTFIX
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P4 - Low : Normal
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/199072/
CVSSv3:SUSE:CVE-2018-5750:4.0:(AV:L/A...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2018-01-29 05:55 UTC by Marcus Meissner
Modified: 2020-06-16 22:08 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2018-01-29 05:55:44 UTC
CVE-2018-5750

The acpi_smbus_hc_add function in drivers/acpi/sbshc.c in the Linux kernel
through 4.14.15 allows local users to obtain sensitive address information by
reading dmesg data from an SBS HC printk call.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5750
http://www.cvedetails.com/cve/CVE-2018-5750/
https://patchwork.kernel.org/patch/10174835/
Comment 1 Marcus Meissner 2018-01-29 05:59:07 UTC
kaslr break, which we do not have currently. in all kernels.
Comment 2 Borislav Petkov 2018-02-02 14:06:17 UTC
So close?
Comment 4 Marcus Meissner 2018-08-29 09:17:58 UTC
we will currently not fix such problems