In the Linux kernel through 4.15.4, the floppy driver reveals the addresses of kernel functions and global variables using printk calls within the function show_floppy in drivers/block/floppy.c. An attacker can read this information from dmesg and use the addresses to find the locations of kernel code and data and bypass kernel security protections such as KASLR.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/103088 | Third Party Advisory VDB Entry |
https://lkml.org/lkml/2018/2/20/669 | Mailing List Third Party Advisory |
https://www.exploit-db.com/exploits/44325/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2018-02-21 00:29
Updated : 2024-02-04 19:46
NVD link : CVE-2018-7273
Mitre link : CVE-2018-7273
CVE.ORG link : CVE-2018-7273
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor