The acpi_ns_terminate() function in drivers/acpi/acpica/nsutils.c in the Linux kernel before 4.12 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.
References
Link | Resource |
---|---|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3b2d69114fefa474fca542e51119036dceb4aa6f | Issue Tracking Patch Third Party Advisory |
https://github.com/acpica/acpica/commit/a23325b2e583556eae88ed3f764e457786bf4df6 | Issue Tracking Patch Third Party Advisory |
https://github.com/torvalds/linux/commit/3b2d69114fefa474fca542e51119036dceb4aa6f | Issue Tracking Patch Third Party Advisory |
https://usn.ubuntu.com/3619-1/ | |
https://usn.ubuntu.com/3619-2/ | |
https://usn.ubuntu.com/3754-1/ |
Configurations
History
No history.
Information
Published : 2017-07-20 04:29
Updated : 2024-02-28 16:04
NVD link : CVE-2017-11472
Mitre link : CVE-2017-11472
CVE.ORG link : CVE-2017-11472
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-755
Improper Handling of Exceptional Conditions