In FreeBSD before 11.2-STABLE(r338983), 11.2-RELEASE-p4, 11.1-RELEASE-p15, 10.4-STABLE(r338984), and 10.4-RELEASE-p13, due to insufficient initialization of memory copied to userland in the getcontext and swapcontext system calls, small amounts of kernel memory may be disclosed to userland processes. Unprivileged authenticated local users may be able to access small amounts privileged kernel data.
References
Link | Resource |
---|---|
https://security.FreeBSD.org/advisories/FreeBSD-EN-18:12.mem.asc | Patch Vendor Advisory |
https://security.FreeBSD.org/advisories/FreeBSD-EN-18:12.mem.asc | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://security.FreeBSD.org/advisories/FreeBSD-EN-18:12.mem.ascĀ - Patch, Vendor Advisory |
Information
Published : 2018-09-28 13:29
Updated : 2024-11-21 03:53
NVD link : CVE-2018-17155
Mitre link : CVE-2018-17155
CVE.ORG link : CVE-2018-17155
JSON object : View
Products Affected
freebsd
- freebsd
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor