CVE-2018-17155

In FreeBSD before 11.2-STABLE(r338983), 11.2-RELEASE-p4, 11.1-RELEASE-p15, 10.4-STABLE(r338984), and 10.4-RELEASE-p13, due to insufficient initialization of memory copied to userland in the getcontext and swapcontext system calls, small amounts of kernel memory may be disclosed to userland processes. Unprivileged authenticated local users may be able to access small amounts privileged kernel data.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:10.4:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:10.4:p13:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.1:p15:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p4:*:*:*:*:*:*

History

21 Nov 2024, 03:53

Type Values Removed Values Added
References () https://security.FreeBSD.org/advisories/FreeBSD-EN-18:12.mem.ascĀ - Patch, Vendor Advisory () https://security.FreeBSD.org/advisories/FreeBSD-EN-18:12.mem.ascĀ - Patch, Vendor Advisory

Information

Published : 2018-09-28 13:29

Updated : 2024-11-21 03:53


NVD link : CVE-2018-17155

Mitre link : CVE-2018-17155

CVE.ORG link : CVE-2018-17155


JSON object : View

Products Affected

freebsd

  • freebsd
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor