CVE-2017-7187

The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel through 4.10.4 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:31

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/96989 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/96989 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1038086 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1038086 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2017:1842 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:1842 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2017:2077 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:2077 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2017:2669 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:2669 - Third Party Advisory
References () https://gist.github.com/dvyukov/48ad14e84de45b0be92b7f0eda20ff1b - Third Party Advisory () https://gist.github.com/dvyukov/48ad14e84de45b0be92b7f0eda20ff1b - Third Party Advisory
References () https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=4.11/scsi-fixes&id=bf33f87dd04c371ea33feb821b60d63d754e3124 - Issue Tracking, Patch, Vendor Advisory () https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=4.11/scsi-fixes&id=bf33f87dd04c371ea33feb821b60d63d754e3124 - Issue Tracking, Patch, Vendor Advisory
References () https://source.android.com/security/bulletin/pixel/2017-10-01 - Third Party Advisory () https://source.android.com/security/bulletin/pixel/2017-10-01 - Third Party Advisory

Information

Published : 2017-03-20 14:59

Updated : 2025-04-20 01:37


NVD link : CVE-2017-7187

Mitre link : CVE-2017-7187

CVE.ORG link : CVE-2017-7187


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer