vulnerability
Red Hat: CVE-2018-7273: kernel: Kernel address information leak in drivers/block/floppy.c:show_floppy function potentially allowing KASLR bypass
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:N/C:C/I:N/A:N) | Feb 21, 2018 | Jul 9, 2025 | Jul 9, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:C/I:N/A:N)
Published
Feb 21, 2018
Added
Jul 9, 2025
Modified
Jul 9, 2025
Description
In the Linux kernel through 4.15.4, the floppy driver reveals the addresses of kernel functions and global variables using printk calls within the function show_floppy in drivers/block/floppy.c. An attacker can read this information from dmesg and use the addresses to find the locations of kernel code and data and bypass kernel security protections such as KASLR.
Solution
no-fix-redhat-rpm-package
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.