First published: Thu Mar 08 2018(Updated: )
An issue was discovered in the fd_locked_ioctl function in drivers/block/floppy.c in the Linux kernel through 4.15.7. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=4.15.7 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Canonical Ubuntu Linux | =18.04 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7755 is a vulnerability that affects the Linux kernel through version 4.15.7.
CVE-2018-7755 allows an attacker to copy a kernel pointer to user memory through the floppy driver's FDGETPRM ioctl.
The severity of CVE-2018-7755 is low.
To fix CVE-2018-7755, update the Linux kernel to version 4.15.8 or later.
You can find more information about CVE-2018-7755 on the following websites: [https://lkml.org/lkml/2018/3/7/1116](https://lkml.org/lkml/2018/3/7/1116), [https://marc.info/?l=linux-kernel&m=152046737321740&w=2](https://marc.info/?l=linux-kernel&m=152046737321740&w=2), [https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1553217](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1553217).