CVE-2020-9383

7.1 HIGH

📋 TL;DR

This vulnerability in the Linux kernel's floppy driver allows an out-of-bounds read when accessing the Floppy Disk Controller (FDC) index without proper error checking. Attackers could potentially read kernel memory, leading to information disclosure or system crashes. Systems running Linux kernel versions 3.16 through 5.5.6 with floppy driver functionality are affected.

💻 Affected Systems

Products:
  • Linux kernel
Versions: 3.16 through 5.5.6
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with floppy driver functionality enabled/loaded

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel memory information disclosure leading to privilege escalation or system crash/DoS

🟠

Likely Case

System instability or crash due to invalid memory access

🟢

If Mitigated

Minimal impact if floppy driver is disabled or system is patched

🌐 Internet-Facing: LOW - Requires local access or specific floppy-related network services
🏢 Internal Only: MEDIUM - Local attackers could exploit this on vulnerable systems

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and floppy driver interaction

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel 5.5.7 and later

Vendor Advisory: http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html

Restart Required: Yes

Instructions:

1. Update kernel to version 5.5.7 or later
2. Apply kernel patch commit 2e90ca68b0d2
3. Reboot system to load patched kernel

🔧 Temporary Workarounds

Disable floppy driver

linux

Remove or blacklist floppy driver module to prevent exploitation

echo 'blacklist floppy' | sudo tee /etc/modprobe.d/blacklist-floppy.conf
sudo rmmod floppy

🧯 If You Can't Patch

  • Disable floppy driver functionality via kernel parameters or module blacklisting
  • Restrict local access to prevent unauthorized users from exploiting the vulnerability

🔍 How to Verify

Check if Vulnerable:

Check kernel version: uname -r and verify if between 3.16 and 5.5.6, and check if floppy module is loaded: lsmod | grep floppy

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is 5.5.7 or later: uname -r, and check for patch commit in kernel source

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages related to floppy driver
  • System crashes or instability

Network Indicators:

  • None - local vulnerability only

SIEM Query:

search 'kernel: floppy' OR 'kernel: FDC' in system logs

🔗 References

📤 Share & Export