In FreeBSD before 11.1-STABLE, 11.1-RELEASE-p4, 11.0-RELEASE-p15, 10.4-STABLE, 10.4-RELEASE-p3, and 10.3-RELEASE-p24, the kernel does not properly clear the memory of the kld_file_stat structure before filling the data. Since the structure filled by the kernel is allocated on the kernel stack and copied to userspace, a leak of information from the kernel stack is possible. As a result, some bytes from the kernel stack can be observed in userspace.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/101857 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1039811 | Third Party Advisory VDB Entry |
https://www.freebsd.org/security/advisories/FreeBSD-SA-17:10.kldstat.asc | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2017-11-16 20:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-1088
Mitre link : CVE-2017-1088
CVE.ORG link : CVE-2017-1088
JSON object : View
Products Affected
freebsd
- freebsd
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor