In the Linux kernel through 4.15.4, the floppy driver reveals the addresses of kernel functions and global variables using printk calls within the function show_floppy in drivers/block/floppy.c. An attacker can read this information from dmesg and use the addresses to find the locations of kernel code and data and bypass kernel security protections such as KASLR.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/103088 | Third Party Advisory VDB Entry |
https://lkml.org/lkml/2018/2/20/669 | Mailing List Third Party Advisory |
https://www.exploit-db.com/exploits/44325/ | Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/103088 | Third Party Advisory VDB Entry |
https://lkml.org/lkml/2018/2/20/669 | Mailing List Third Party Advisory |
https://www.exploit-db.com/exploits/44325/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 04:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/103088 - Third Party Advisory, VDB Entry | |
References | () https://lkml.org/lkml/2018/2/20/669 - Mailing List, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/44325/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2018-02-21 00:29
Updated : 2024-11-21 04:11
NVD link : CVE-2018-7273
Mitre link : CVE-2018-7273
CVE.ORG link : CVE-2018-7273
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor