First published: Thu Nov 21 2013(Updated: )
The qls_eioctl function in sys/dev/qlxge/qls_ioctl.c in the kernel in FreeBSD 10 and earlier does not validate a certain size parameter, which allows local users to obtain sensitive information from kernel memory via a crafted ioctl call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | <=10.0 | |
FreeBSD Kernel | =0.4_1 | |
FreeBSD Kernel | =1.0 | |
FreeBSD Kernel | =1.1 | |
FreeBSD Kernel | =1.1.5 | |
FreeBSD Kernel | =1.1.5.1 | |
FreeBSD Kernel | =1.2 | |
FreeBSD Kernel | =1.5 | |
FreeBSD Kernel | =2.0 | |
FreeBSD Kernel | =2.0.1 | |
FreeBSD Kernel | =2.0.5 | |
FreeBSD Kernel | =2.1 | |
FreeBSD Kernel | =2.1.0 | |
FreeBSD Kernel | =2.1.5 | |
FreeBSD Kernel | =2.1.6 | |
FreeBSD Kernel | =2.1.6.1 | |
FreeBSD Kernel | =2.1.7 | |
FreeBSD Kernel | =2.1.7.1 | |
FreeBSD Kernel | =2.2 | |
FreeBSD Kernel | =2.2.1 | |
FreeBSD Kernel | =2.2.2 | |
FreeBSD Kernel | =2.2.3 | |
FreeBSD Kernel | =2.2.4 | |
FreeBSD Kernel | =2.2.5 | |
FreeBSD Kernel | =2.2.6 | |
FreeBSD Kernel | =2.2.7 | |
FreeBSD Kernel | =2.2.8 | |
FreeBSD Kernel | =3.0 | |
FreeBSD Kernel | =3.1 | |
FreeBSD Kernel | =3.2 | |
FreeBSD Kernel | =3.3 | |
FreeBSD Kernel | =3.4 | |
FreeBSD Kernel | =3.5 | |
FreeBSD Kernel | =3.5.1 | |
FreeBSD Kernel | =4.0 | |
FreeBSD Kernel | =4.1 | |
FreeBSD Kernel | =4.1.1 | |
FreeBSD Kernel | =4.2 | |
FreeBSD Kernel | =4.3 | |
FreeBSD Kernel | =4.4 | |
FreeBSD Kernel | =4.5 | |
FreeBSD Kernel | =4.6 | |
FreeBSD Kernel | =4.6.2 | |
FreeBSD Kernel | =4.7 | |
FreeBSD Kernel | =4.8 | |
FreeBSD Kernel | =4.9 | |
FreeBSD Kernel | =4.10 | |
FreeBSD Kernel | =4.11 | |
FreeBSD Kernel | =5.0 | |
FreeBSD Kernel | =5.1 | |
FreeBSD Kernel | =5.2 | |
FreeBSD Kernel | =5.2.1 | |
FreeBSD Kernel | =5.3 | |
FreeBSD Kernel | =5.4 | |
FreeBSD Kernel | =5.5 | |
FreeBSD Kernel | =6.0 | |
FreeBSD Kernel | =6.1 | |
FreeBSD Kernel | =6.2 | |
FreeBSD Kernel | =6.3 | |
FreeBSD Kernel | =6.4 | |
FreeBSD Kernel | =7.0 | |
FreeBSD Kernel | =7.1 | |
FreeBSD Kernel | =7.2 | |
FreeBSD Kernel | =7.3 | |
FreeBSD Kernel | =7.4 | |
FreeBSD Kernel | =8.0 | |
FreeBSD Kernel | =8.1 | |
FreeBSD Kernel | =8.2 | |
FreeBSD Kernel | =8.3 | |
FreeBSD Kernel | =8.4 | |
FreeBSD Kernel | =9.0 | |
FreeBSD Kernel | =9.1 | |
FreeBSD Kernel | =9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6833 is considered a medium severity vulnerability due to its potential to expose sensitive information from kernel memory.
To fix CVE-2013-6833, apply the latest security patches provided by FreeBSD that address this ioctl parameter validation issue.
CVE-2013-6833 affects FreeBSD 10 and earlier versions, allowing local users to exploit it.
CVE-2013-6833 enables a local privilege escalation attack that can lead to the disclosure of sensitive kernel memory.
Currently, the best practice is to update to a supported version of FreeBSD that has patched CVE-2013-6833.