Your submission was sent successfully! Close

CVE-2016-10088

Published: 30 December 2016

The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.

From the Ubuntu security team

It was discovered that the generic SCSI block layer in the Linux kernel did not properly restrict write operations in certain situations. A local attacker could use this to cause a denial of service (system crash) or possibly gain administrative privileges.

Priority

Low

CVSS 3 base score: 7.0

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
Patches:
Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed by 128394eff343fc6d2f32172f03e24829539c5835
linux-armadaxp
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
This package is not directly supported by the Ubuntu Security Team
linux-aws
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
linux-azure
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
linux-euclid
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
linux-flo
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
linux-gcp
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
linux-gke
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
linux-goldfish
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
linux-grouper
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
linux-hwe
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
linux-hwe-edge
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
linux-kvm
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
linux-linaro-omap
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
linux-linaro-shared
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
linux-linaro-vexpress
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
linux-lts-quantal
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
This package is not directly supported by the Ubuntu Security Team
linux-lts-raring
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
linux-lts-saucy
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
This package is not directly supported by the Ubuntu Security Team
linux-lts-trusty
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
linux-lts-utopic
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
linux-lts-vivid
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
linux-lts-wily
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
linux-lts-xenial
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
linux-maguro
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
linux-mako
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
linux-manta
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
linux-oem
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
linux-qcm-msm
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
linux-raspi2
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
linux-snapdragon
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc1)