The atyfb_ioctl function in drivers/video/fbdev/aty/atyfb_base.c in the Linux kernel through 4.12.10 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading locations associated with padding bytes.
References
Link | Resource |
---|---|
http://www.debian.org/security/2017/dsa-3981 | |
http://www.securityfocus.com/bid/100634 | |
https://github.com/torvalds/linux/pull/441 | Issue Tracking Patch Third Party Advisory |
https://marc.info/?l=linux-kernel&m=150401461613306&w=2 | Mailing List Patch Third Party Advisory |
https://marc.info/?l=linux-kernel&m=150453196710422&w=2 | Mailing List Patch Third Party Advisory |
https://usn.ubuntu.com/3583-1/ | |
https://usn.ubuntu.com/3583-2/ | |
http://www.debian.org/security/2017/dsa-3981 | |
http://www.securityfocus.com/bid/100634 | |
https://github.com/torvalds/linux/pull/441 | Issue Tracking Patch Third Party Advisory |
https://marc.info/?l=linux-kernel&m=150401461613306&w=2 | Mailing List Patch Third Party Advisory |
https://marc.info/?l=linux-kernel&m=150453196710422&w=2 | Mailing List Patch Third Party Advisory |
https://usn.ubuntu.com/3583-1/ | |
https://usn.ubuntu.com/3583-2/ |
Configurations
History
21 Nov 2024, 03:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2017/dsa-3981 - | |
References | () http://www.securityfocus.com/bid/100634 - | |
References | () https://github.com/torvalds/linux/pull/441 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://marc.info/?l=linux-kernel&m=150401461613306&w=2 - Mailing List, Patch, Third Party Advisory | |
References | () https://marc.info/?l=linux-kernel&m=150453196710422&w=2 - Mailing List, Patch, Third Party Advisory | |
References | () https://usn.ubuntu.com/3583-1/ - | |
References | () https://usn.ubuntu.com/3583-2/ - |
Information
Published : 2017-09-05 17:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-14156
Mitre link : CVE-2017-14156
CVE.ORG link : CVE-2017-14156
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor