First published: Thu Nov 21 2013(Updated: )
The ql_eioctl function in sys/dev/qlxgbe/ql_ioctl.c in the kernel in FreeBSD 10 and earlier does not validate a certain size parameter, which allows local users to obtain sensitive information from kernel memory via a crafted ioctl call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | <=10.0 | |
FreeBSD Kernel | =0.4_1 | |
FreeBSD Kernel | =1.0 | |
FreeBSD Kernel | =1.1 | |
FreeBSD Kernel | =1.1.5 | |
FreeBSD Kernel | =1.1.5.1 | |
FreeBSD Kernel | =1.2 | |
FreeBSD Kernel | =1.5 | |
FreeBSD Kernel | =2.0 | |
FreeBSD Kernel | =2.0.1 | |
FreeBSD Kernel | =2.0.5 | |
FreeBSD Kernel | =2.1 | |
FreeBSD Kernel | =2.1.0 | |
FreeBSD Kernel | =2.1.5 | |
FreeBSD Kernel | =2.1.6 | |
FreeBSD Kernel | =2.1.6.1 | |
FreeBSD Kernel | =2.1.7 | |
FreeBSD Kernel | =2.1.7.1 | |
FreeBSD Kernel | =2.2 | |
FreeBSD Kernel | =2.2.1 | |
FreeBSD Kernel | =2.2.2 | |
FreeBSD Kernel | =2.2.3 | |
FreeBSD Kernel | =2.2.4 | |
FreeBSD Kernel | =2.2.5 | |
FreeBSD Kernel | =2.2.6 | |
FreeBSD Kernel | =2.2.7 | |
FreeBSD Kernel | =2.2.8 | |
FreeBSD Kernel | =3.0 | |
FreeBSD Kernel | =3.1 | |
FreeBSD Kernel | =3.2 | |
FreeBSD Kernel | =3.3 | |
FreeBSD Kernel | =3.4 | |
FreeBSD Kernel | =3.5 | |
FreeBSD Kernel | =3.5.1 | |
FreeBSD Kernel | =4.0 | |
FreeBSD Kernel | =4.1 | |
FreeBSD Kernel | =4.1.1 | |
FreeBSD Kernel | =4.2 | |
FreeBSD Kernel | =4.3 | |
FreeBSD Kernel | =4.4 | |
FreeBSD Kernel | =4.5 | |
FreeBSD Kernel | =4.6 | |
FreeBSD Kernel | =4.6.2 | |
FreeBSD Kernel | =4.7 | |
FreeBSD Kernel | =4.8 | |
FreeBSD Kernel | =4.9 | |
FreeBSD Kernel | =4.10 | |
FreeBSD Kernel | =4.11 | |
FreeBSD Kernel | =5.0 | |
FreeBSD Kernel | =5.1 | |
FreeBSD Kernel | =5.2 | |
FreeBSD Kernel | =5.2.1 | |
FreeBSD Kernel | =5.3 | |
FreeBSD Kernel | =5.4 | |
FreeBSD Kernel | =5.5 | |
FreeBSD Kernel | =6.0 | |
FreeBSD Kernel | =6.1 | |
FreeBSD Kernel | =6.2 | |
FreeBSD Kernel | =6.3 | |
FreeBSD Kernel | =6.4 | |
FreeBSD Kernel | =7.0 | |
FreeBSD Kernel | =7.1 | |
FreeBSD Kernel | =7.2 | |
FreeBSD Kernel | =7.3 | |
FreeBSD Kernel | =7.4 | |
FreeBSD Kernel | =8.0 | |
FreeBSD Kernel | =8.1 | |
FreeBSD Kernel | =8.2 | |
FreeBSD Kernel | =8.3 | |
FreeBSD Kernel | =8.4 | |
FreeBSD Kernel | =9.0 | |
FreeBSD Kernel | =9.1 | |
FreeBSD Kernel | =9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6834 is classified as a local information disclosure vulnerability.
To fix CVE-2013-6834, upgrade to FreeBSD 10.1 or later, or apply the relevant patches provided by FreeBSD.
CVE-2013-6834 affects FreeBSD versions 10 and earlier, including multiple specific releases.
CVE-2013-6834 exploits a lack of validation in the ql_eioctl function, enabling sensitive information retrieval from kernel memory.
CVE-2013-6834 requires local access to the system, making it primarily a local threat rather than a remote exploit.