Your submission was sent successfully! Close

CVE-2015-5707

Published: 03 August 2015

Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.

From the Ubuntu security team

It was discovered that an integer overflow error existed in the SCSI generic (sg) driver in the Linux kernel. A local attacker with write permission to a SCSI generic device could use this to cause a denial of service (system crash) or potentially escalate their privileges.

Priority

Medium

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
Patches:
Introduced by 10db10d144c0248f285242f79daf6b9de6b00a62
Fixed by 451a2886b6bf90e2fb378f7c46c655450fb96e81
Introduced by bc917be8105993c256338ad1189650364a741483
Fixed by fdc81f45e9f57858da6351836507fbcf1b7583ee
linux-2.6
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
linux-armadaxp
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
This package is not directly supported by the Ubuntu Security Team
linux-aws
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
linux-ec2
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
linux-flo
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
linux-gke
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
linux-goldfish
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
linux-grouper
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
linux-hwe
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
linux-hwe-edge
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
linux-linaro-omap
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
linux-linaro-shared
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
linux-linaro-vexpress
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
linux-lts-quantal
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
This package is not directly supported by the Ubuntu Security Team
linux-lts-raring
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
linux-lts-saucy
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
This package is not directly supported by the Ubuntu Security Team
linux-lts-trusty
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
linux-lts-utopic
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
linux-lts-vivid
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
linux-lts-wily
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
linux-lts-xenial
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
linux-maguro
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
linux-mako
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
linux-manta
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
linux-qcm-msm
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
linux-raspi2
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
linux-snapdragon
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (4.1~rc1)

Notes

AuthorNote
jdstrand
android kernels (flo, goldfish, grouper, maguro, mako and manta) are
not supported on the Ubuntu Touch 14.10 and earlier preview kernels
linux-lts-saucy no longer receives official support
linux-lts-quantal no longer receives official support
sbeattie
Probably introduced in https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=10db10d144c0248f285242f79daf6b9de6b00a62 (v2.6.28-rc1)
Fixed by https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=451a2886b6bf90e2fb378f7c46c655450fb96e81 (v4.1-rc1)
and Fixed by https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdc81f45e9f57858da6351836507fbcf1b7583ee (v4.1-rc1)
see note about backporting in oss-security message.
kamal
As per BenH's notes, the fdc81f45 fix requires import_iovec() from bc917be8 (v4.1-rc1), so set the 'break' SHA for that to bc917be8.

References

Bugs