A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4e0dff2095c579b142d5a0693257f1c58b4804 | patch vendor advisory |
https://seclists.org/oss-sec/2020/q4/104 | mailing list exploit third party advisory |
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9.7 | release notes vendor advisory |
http://www.openwall.com/lists/oss-security/2020/11/25/1 | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html | third party advisory mailing list |
https://security.netapp.com/advisory/ntap-20210108-0003/ | third party advisory |