vulnerability
FreeBSD: VID-7c5d64dd-600a-11e6-a6c3-14dae9d210b8: FreeBSD -- Kernel stack disclosure in Linux compatibility layer
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | Aug 11, 2016 | Aug 12, 2016 | Dec 10, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
Aug 11, 2016
Added
Aug 12, 2016
Modified
Dec 10, 2025
Description
Problem Description: The implementation of the TIOCGSERIAL ioctl(2) does not clear the output struct before copying it out to userland. The implementation of the Linux sysinfo() system call does not clear the output struct before copying it out to userland. Impact: An unprivileged user can read a portion of uninitialised kernel stack data, which may contain sensitive information, such as the stack guard, portions of the file cache or terminal buffers, which an attacker might leverage to obtain elevated privileges.
Solutions
freebsd-upgrade-base-10_3-release-p4freebsd-upgrade-base-10_2-release-p18freebsd-upgrade-base-10_1-release-p35freebsd-upgrade-base-9_3-release-p43
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.