The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-10088.json"
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.10.107"
}
]
},
{
"events": [
{
"introduced": "3.11"
},
{
"fixed": "3.12.70"
}
]
},
{
"events": [
{
"introduced": "3.13"
},
{
"fixed": "3.16.40"
}
]
},
{
"events": [
{
"introduced": "3.17"
},
{
"fixed": "3.18.47"
}
]
},
{
"events": [
{
"introduced": "3.19"
},
{
"fixed": "4.1.38"
}
]
},
{
"events": [
{
"introduced": "4.2"
},
{
"fixed": "4.4.41"
}
]
},
{
"events": [
{
"introduced": "4.5"
},
{
"fixed": "4.8.17"
}
]
},
{
"events": [
{
"introduced": "4.9"
},
{
"fixed": "4.9.2"
}
]
}
]