Lucene search

K
f5F5F5:K03007515
HistoryMay 19, 2022 - 12:00 a.m.

K03007515 : Linux kernel vulnerabilities CVE-2018-7755 and CVE-2019-14283

2022-05-1900:00:00
my.f5.com
33
linux
kernel
vulnerabilities
floppy driver
ioctl
security
kaslr
integer overflow
out-of-bounds read
qemu

AI Score

6.7

Confidence

High

EPSS

0.001

Percentile

36.1%

Security Advisory Description

An issue was discovered in the fd_locked_ioctl function in drivers/block/floppy.c in the Linux kernel through 4.15.7. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR.

In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.

Impact

There is no impact; F5 products are not affected by this vulnerability.