vulnerability
FreeBSD: VID-6e04048b-6007-11e6-a6c3-14dae9d210b8 (CVE-2014-3873): FreeBSD -- ktrace kernel memory disclosure
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:L/Au:N/C:P/I:N/A:N) | Aug 11, 2016 | Dec 10, 2025 | Dec 10, 2025 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
Aug 11, 2016
Added
Dec 10, 2025
Modified
Dec 10, 2025
Description
Problem Description: Due to an overlooked merge to -STABLE branches, the size for page fault kernel trace entries was set incorrectly. Impact: A user who can enable kernel process tracing could end up reading the contents of kernel memory. Such memory might contain sensitive information, such as portions of the file cache or terminal buffers. This information might be directly useful, or it might be leveraged to obtain elevated privileges in some way; for example, a terminal buffer might include a user-entered password.
Solutions
freebsd-upgrade-base-9_2-release-p7freebsd-upgrade-base-9_1-release-p14freebsd-upgrade-base-8_4-release-p11
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.