Vulnerability Name: | CVE-2018-7755 (CCN-140065) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2018-03-07 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2018-03-07 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2018-10-04 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | An issue was discovered in the fd_locked_ioctl function in drivers/block/floppy.c in the Linux kernel through 4.15.7. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
3.5 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
5.2 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-200 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-7755 Source: CCN Type: IBM Security Bulletin 843434 (API Connect) IBM API Connect has addressed multiple vulnerabilities in Developer Portal's dependencies - Cumulative list from June 28, 2018 to December 13, 2018 Source: REDHAT Type: UNKNOWN RHSA-2019:2029 Source: REDHAT Type: UNKNOWN RHSA-2019:2043 Source: XF Type: UNKNOWN linux-kernel-cve20187755-sec-bypass(140065) Source: MLIST Type: UNKNOWN [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update Source: CCN Type: LKML Web site Do not copy a kernel pointer to user memory in FDGETPRM ioctl Source: MISC Type: Exploit, Third Party Advisory https://lkml.org/lkml/2018/3/7/1116 Source: UBUNTU Type: Third Party Advisory USN-3695-1 Source: UBUNTU Type: Third Party Advisory USN-3695-2 Source: UBUNTU Type: Third Party Advisory USN-3696-1 Source: UBUNTU Type: Third Party Advisory USN-3696-2 Source: UBUNTU Type: Third Party Advisory USN-3697-1 Source: UBUNTU Type: Third Party Advisory USN-3697-2 Source: UBUNTU Type: Third Party Advisory USN-3698-1 Source: UBUNTU Type: Third Party Advisory USN-3698-2 Source: DEBIAN Type: UNKNOWN DSA-4308 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration RedHat 6: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
BACK |