First published: Thu Jun 18 2009(Updated: )
Integer overflow in the pipe_build_write_buffer function (sys/kern/sys_pipe.c) in the direct write optimization feature in the pipe implementation in FreeBSD 7.1 through 7.2 and 6.3 through 6.4 allows local users to bypass virtual-to-physical address lookups and read sensitive information in memory pages via unspecified vectors.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =6.4 | |
FreeBSD Kernel | =6.3 | |
FreeBSD Kernel | =6.3_releng | |
FreeBSD Kernel | =7.1-release-p2 | |
FreeBSD Kernel | =7.1-rc1 | |
FreeBSD Kernel | =7.1-release-p1 | |
FreeBSD Kernel | =7.1-stable | |
FreeBSD Kernel | =6.4-stable | |
FreeBSD Kernel | =6.4-release_p4 | |
FreeBSD Kernel | =7.2-pre-release | |
FreeBSD Kernel | =7.1 | |
FreeBSD Kernel | =7.2 | |
FreeBSD Kernel | =6.3-release_p10 | |
FreeBSD Kernel | =7.1-pre-release | |
FreeBSD Kernel | =7.1-release-p5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1935 is considered to have a medium severity level due to its potential to allow local users to read sensitive information in memory.
To fix CVE-2009-1935, you should update your FreeBSD system to the latest version that addresses this vulnerability.
CVE-2009-1935 affects FreeBSD versions 6.3 through 6.4 and 7.1 through 7.2.
CVE-2009-1935 cannot be exploited remotely as it requires local access to the system.
CVE-2009-1935 is an integer overflow vulnerability in the pipe_build_write_buffer function.