#VU47091 Out-of-bounds read in Linux kernel


Published: 2020-09-15 | Updated: 2020-09-26

Vulnerability identifier: #VU47091

Vulnerability risk: Low

CVSSv3.1: 5.2 [CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-14304

CWE-ID: CWE-125

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local privileged user to gain access to sensitive information.

A memory disclosure flaw was found in the Linux kernel's ethernet drivers, in the way it read data from the EEPROM of the device. This flaw allows a local user to read uninitialized values from the kernel memory.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: 4.9.210-1, 4.19.118-2, 5.6.7-1


External links
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702
http://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability