A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.
References
Link | Resource |
---|---|
https://seclists.org/oss-sec/2020/q4/104 | Exploit Mailing List Third Party Advisory |
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9.7 | Release Notes Vendor Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4e0dff2095c579b142d5a0693257f1c58b4804 | Patch Vendor Advisory |
http://www.openwall.com/lists/oss-security/2020/11/25/1 | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20210108-0003/ | Third Party Advisory |
Information
Published : 2020-11-20 10:15
Updated : 2021-01-27 11:44
NVD link : CVE-2020-28974
Mitre link : CVE-2020-28974
JSON object : View
CWE
CWE-125
Out-of-bounds Read
Products Affected
debian
- debian_linux
linux
- linux_kernel