Description
A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.
References (7)
Core 7
Core References
Patch, Vendor Advisory x_refsource_misc
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4e0dff2095c579b142d5a0693257f1c58b4804
Exploit, Mailing List, Third Party Advisory x_refsource_misc
https://seclists.org/oss-sec/2020/q4/104
Release Notes, Vendor Advisory x_refsource_misc
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9.7
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2020/11/25/1
Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html
Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20210108-0003/
Scores
CVSS v3
5.0
EPSS
0.0006
EPSS Percentile
18.4%
Attack Vector
PHYSICAL
CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H
Details
CWE
CWE-125
Status
published
Products (2)
debian/debian_linux
9.0
linux/linux_kernel
< 5.9.7
Published
Nov 20, 2020
Tracked Since
Feb 18, 2026