#VU25813 Out-of-bounds read in Linux kernel


Published: 2020-03-08

Vulnerability identifier: #VU25813

Vulnerability risk: Low

CVSSv3.1:

CVE-ID: CVE-2020-9383

CWE-ID: CWE-125

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the set_fdc() function in drivers/block/floppy.c file in Linux kernel due to the FDC index is not checked for errors before assigning it. A local user can use a specially crafted application to trigger out-of-bounds read error and read contents of memory on the system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Linux kernel: 5.5 - 5.5.6


CPE

External links
http://github.com/torvalds/linux/commit/2e90ca68b0d2f5548804f22f0dd61145516171e3


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?


Latest bulletins with this vulnerability