The atyfb_ioctl function in drivers/video/fbdev/aty/atyfb_base.c in the Linux kernel through 4.12.10 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading locations associated with padding bytes.
References
Link | Resource |
---|---|
http://www.debian.org/security/2017/dsa-3981 | |
http://www.securityfocus.com/bid/100634 | |
https://github.com/torvalds/linux/pull/441 | Issue Tracking Patch Third Party Advisory |
https://marc.info/?l=linux-kernel&m=150401461613306&w=2 | Mailing List Patch Third Party Advisory |
https://marc.info/?l=linux-kernel&m=150453196710422&w=2 | Mailing List Patch Third Party Advisory |
https://usn.ubuntu.com/3583-1/ | |
https://usn.ubuntu.com/3583-2/ |
Configurations
History
No history.
Information
Published : 2017-09-05 17:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-14156
Mitre link : CVE-2017-14156
CVE.ORG link : CVE-2017-14156
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor