The acpi_ps_complete_final_op() function in drivers/acpi/acpica/psobject.c in the Linux kernel through 4.12.9 does not flush the node and node_ext caches and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.
References
Link | Resource |
---|---|
https://patchwork.kernel.org/patch/9806085/ | Patch Third Party Advisory |
https://github.com/acpica/acpica/pull/278/commits/4a0243ecb4c94e2d73510d096c5ea4d0711fc6c0 | Issue Tracking Patch Third Party Advisory |
http://www.securityfocus.com/bid/100500 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2017-08-25 01:29
Updated : 2017-09-20 07:50
NVD link : CVE-2017-13694
Mitre link : CVE-2017-13694
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
linux
- linux_kernel