In FreeBSD before 11.1-STABLE, 11.1-RELEASE-p4, 11.0-RELEASE-p15, 10.4-STABLE, 10.4-RELEASE-p3, and 10.3-RELEASE-p24, the kernel does not properly clear the memory of the kld_file_stat structure before filling the data. Since the structure filled by the kernel is allocated on the kernel stack and copied to userspace, a leak of information from the kernel stack is possible. As a result, some bytes from the kernel stack can be observed in userspace.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/101857 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1039811 | Third Party Advisory VDB Entry |
https://www.freebsd.org/security/advisories/FreeBSD-SA-17:10.kldstat.asc | Vendor Advisory |
http://www.securityfocus.com/bid/101857 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1039811 | Third Party Advisory VDB Entry |
https://www.freebsd.org/security/advisories/FreeBSD-SA-17:10.kldstat.asc | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/101857 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1039811 - Third Party Advisory, VDB Entry | |
References | () https://www.freebsd.org/security/advisories/FreeBSD-SA-17:10.kldstat.asc - Vendor Advisory |
Information
Published : 2017-11-16 20:29
Updated : 2024-11-21 03:21
NVD link : CVE-2017-1088
Mitre link : CVE-2017-1088
CVE.ORG link : CVE-2017-1088
JSON object : View
Products Affected
freebsd
- freebsd
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor