The acpi_ns_terminate() function in drivers/acpi/acpica/nsutils.c in the Linux kernel before 4.12 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.
References
Configurations
History
21 Nov 2024, 03:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3b2d69114fefa474fca542e51119036dceb4aa6f - Issue Tracking, Patch, Third Party Advisory | |
References | () https://github.com/acpica/acpica/commit/a23325b2e583556eae88ed3f764e457786bf4df6 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://github.com/torvalds/linux/commit/3b2d69114fefa474fca542e51119036dceb4aa6f - Issue Tracking, Patch, Third Party Advisory | |
References | () https://usn.ubuntu.com/3619-1/ - | |
References | () https://usn.ubuntu.com/3619-2/ - | |
References | () https://usn.ubuntu.com/3754-1/ - |
Information
Published : 2017-07-20 04:29
Updated : 2024-11-21 03:07
NVD link : CVE-2017-11472
Mitre link : CVE-2017-11472
CVE.ORG link : CVE-2017-11472
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-755
Improper Handling of Exceptional Conditions