In the Linux kernel through 4.15.4, the floppy driver reveals the addresses of kernel functions and global variables using printk calls within the function show_floppy in drivers/block/floppy.c. An attacker can read this information from dmesg and use the addresses to find the locations of kernel code and data and bypass kernel security protections such as KASLR.
References
Link | Resource |
---|---|
https://lkml.org/lkml/2018/2/20/669 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/103088 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/44325/ | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2018-02-20 16:29
Updated : 2019-03-01 11:57
NVD link : CVE-2018-7273
Mitre link : CVE-2018-7273
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
linux
- linux_kernel