vulnerability
FreeBSD: FreeBSD -- Kernel stack disclosure in Linux compatibility layer (FreeBSD-SA-16:20.linux)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:C/I:N/A:N) | May 31, 2016 | Aug 12, 2016 | Feb 19, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:S/C:C/I:N/A:N)
Published
May 31, 2016
Added
Aug 12, 2016
Modified
Feb 19, 2025
Description
Problem Description:
The implementation of the TIOCGSERIAL ioctl(2) does not
clear the output struct before copying it out to userland.
The implementation of the Linux sysinfo() system call
does not clear the output struct before copying it out to
userland.
Impact:
An unprivileged user can read a portion of uninitialised
kernel stack data, which may contain sensitive information,
such as the stack guard, portions of the file cache or
terminal buffers, which an attacker might leverage to obtain
elevated privileges.
Solutions
freebsd-upgrade-base-10_1-release-p35freebsd-upgrade-base-10_2-release-p18freebsd-upgrade-base-10_3-release-p4freebsd-upgrade-base-9_3-release-p43
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.