The acpi_ns_evaluate() function in drivers/acpi/acpica/nseval.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://usn.ubuntu.com/3696-1/ | vendor advisory |
https://usn.ubuntu.com/3762-1/ | vendor advisory |
http://www.securityfocus.com/bid/100497 | third party advisory vdb entry |
https://usn.ubuntu.com/3762-2/ | vendor advisory |
https://usn.ubuntu.com/3696-2/ | vendor advisory |
https://github.com/acpica/acpica/pull/296/commits/37f2c716f2c6ab14c3ba557a539c3ee3224931b5 | patch third party advisory issue tracking |
https://patchwork.kernel.org/patch/9850567/ | third party advisory patch |