Vulnerability Name: | CVE-2017-13695 (CCN-131022) | ||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2017-08-25 | ||||||||||||||||||||||||||||||||||||||||||||
Published: | 2017-08-25 | ||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2018-09-11 | ||||||||||||||||||||||||||||||||||||||||||||
Summary: | The acpi_ns_evaluate() function in drivers/acpi/acpica/nseval.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table. | ||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) 4.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:R)
2.9 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:U/RC:R)
| ||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-200 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-13695 Source: CCN Type: IBM Security Bulletin 843434 (API Connect) IBM API Connect has addressed multiple vulnerabilities in Developer Portal's dependencies - Cumulative list from June 28, 2018 to December 13, 2018 Source: BID Type: Third Party Advisory, VDB Entry 100497 Source: CCN Type: BID-100497 Linux Kernel 'drivers/acpi/acpica/nseval.c' Local Information Disclosure Vulnerability Source: XF Type: UNKNOWN linux-kernel-cve201713695-info-disc(131022) Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://github.com/acpica/acpica/pull/296/commits/37f2c716f2c6ab14c3ba557a539c3ee3224931b5 Source: CCN Type: Patchwork Web site acpi: acpica: fix acpi operand cache leak in nseval.c Source: MISC Type: Patch, Third Party Advisory https://patchwork.kernel.org/patch/9850567/ Source: UBUNTU Type: UNKNOWN USN-3696-1 Source: UBUNTU Type: UNKNOWN USN-3696-2 Source: UBUNTU Type: UNKNOWN USN-3762-1 Source: UBUNTU Type: UNKNOWN USN-3762-2 Source: CCN Type: Linux Kernel Web site The Linux Kernel Archives Source: CCN Type: WhiteSource Vulnerability Database CVE-2017-13695 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
BACK |