First published: Tue Jun 10 2014(Updated: )
The ktrace utility in the FreeBSD kernel 8.4 before p11, 9.1 before p14, 9.2 before p7, and 9.3-BETA1 before p1 uses an incorrect page fault kernel trace entry size, which allows local users to obtain sensitive information from kernel memory via a kernel process trace.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =8.4 | |
FreeBSD Kernel | =9.1 | |
FreeBSD Kernel | =9.2 | |
FreeBSD Kernel | =9.3-beta1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3873 has been rated as a moderate vulnerability due to its potential to expose sensitive kernel memory to local users.
To mitigate CVE-2014-3873, upgrade your FreeBSD system to versions 8.4-p11, 9.1-p14, 9.2-p7, or 9.3-BETA1-p1 or later.
CVE-2014-3873 affects local users running FreeBSD versions 8.4, 9.1, 9.2, or 9.3-BETA1 prior to the specified updates.
Systems running FreeBSD kernel versions 8.4, 9.1, 9.2, and 9.3-BETA1 before the mentioned patches are vulnerable to CVE-2014-3873.
CVE-2014-3873 exploits an incorrect page fault kernel trace entry size within the ktrace utility to leak sensitive information.