CVE-2008-3890

The kernel in FreeBSD 6.3 through 7.0 on amd64 platforms can make an extra swapgs call after a General Protection Fault (GPF), which allows local users to gain privileges by triggering a GPF during the kernel's return from (1) an interrupt, (2) a trap, or (3) a system call.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:freebsd:freebsd:6.3:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.0:*:*:*:*:*:*:*
cpe:2.3:h:amd:amd64:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:50

Type Values Removed Values Added
References () http://secunia.com/advisories/31743 - Vendor Advisory () http://secunia.com/advisories/31743 - Vendor Advisory
References () http://security.freebsd.org/advisories/FreeBSD-SA-08:07.amd64.asc - () http://security.freebsd.org/advisories/FreeBSD-SA-08:07.amd64.asc -
References () http://www.securityfocus.com/bid/31003 - () http://www.securityfocus.com/bid/31003 -
References () http://www.securitytracker.com/id?1020815 - () http://www.securitytracker.com/id?1020815 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/44905 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/44905 -

Information

Published : 2008-09-05 16:08

Updated : 2024-11-21 00:50


NVD link : CVE-2008-3890

Mitre link : CVE-2008-3890

CVE.ORG link : CVE-2008-3890


JSON object : View

Products Affected

freebsd

  • freebsd

amd

  • amd64
CWE
CWE-264

Permissions, Privileges, and Access Controls