The acpi_ps_complete_final_op() function in drivers/acpi/acpica/psobject.c in the Linux kernel through 4.12.9 does not flush the node and node_ext caches and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/100500 | Third Party Advisory VDB Entry |
https://github.com/acpica/acpica/pull/278 | |
https://github.com/acpica/acpica/pull/278/commits/4a0243ecb4c94e2d73510d096c5ea4d0711fc6c0 | Issue Tracking Patch Third Party Advisory |
https://patchwork.kernel.org/patch/9806085/ | Patch Third Party Advisory |
http://www.securityfocus.com/bid/100500 | Third Party Advisory VDB Entry |
https://github.com/acpica/acpica/pull/278/commits/4a0243ecb4c94e2d73510d096c5ea4d0711fc6c0 | Issue Tracking Patch Third Party Advisory |
https://patchwork.kernel.org/patch/9806085/ | Patch Third Party Advisory |
Configurations
History
18 Dec 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2017-08-25 08:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-13694
Mitre link : CVE-2017-13694
CVE.ORG link : CVE-2017-13694
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor