In the Linux kernel through 4.15.4, the floppy driver reveals the addresses of kernel functions and global variables using printk calls within the function show_floppy in drivers/block/floppy.c. An attacker can read this information from dmesg and use the addresses to find the locations of kernel code and data and bypass kernel security protections such as KASLR.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://lkml.org/lkml/2018/2/20/669 | third party advisory mailing list |
https://www.exploit-db.com/exploits/44325/ | exploit vdb entry third party advisory |
http://www.securityfocus.com/bid/103088 | vdb entry third party advisory |