CVE-2018-5750Sensitive Information Exposure in Kernel

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 89.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 26
Latest updateMay 14

Description

The acpi_smbus_hc_add function in drivers/acpi/sbshc.c in the Linux kernel through 4.14.15 allows local users to obtain sensitive address information by reading dmesg data from an SBS HC printk call.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages6 packages

Also affects: Debian Linux 7.0, 8.0, 9.0, Ubuntu Linux 12.04, 14.04, 16.04, 17.10, Enterprise Linux 7.6

Patches

🔴Vulnerability Details

4
GHSA
GHSA-2mwq-2q44-8rc8: The acpi_smbus_hc_add function in drivers/acpi/sbshc2022-05-14
OSV
linux-oem vulnerabilities2018-07-02
CVEList
CVE-2018-5750: The acpi_smbus_hc_add function in drivers/acpi/sbshc2018-01-26
OSV
CVE-2018-5750: The acpi_smbus_hc_add function in drivers/acpi/sbshc2018-01-26

📋Vendor Advisories

8
Ubuntu
Linux kernel vulnerabilities2018-07-02
Ubuntu
Linux kernel vulnerabilities2018-07-02
Ubuntu
Linux kernel (Trusty HWE) vulnerabilities2018-07-02
Ubuntu
Linux kernel (OEM) vulnerabilities2018-07-02
Ubuntu
Linux kernel vulnerabilities2018-04-24

💬Community

2
Bugzilla
CVE-2018-5750 kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass2018-01-29
Bugzilla
CVE-2018-5750 kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass [fedora-all]2018-01-29
CVE-2018-5750 — Sensitive Information Exposure | cvebase