In some cases, the ktrace facility will log the contents of kernel structures to userspace. In one such case, ktrace dumps a variable-sized sockaddr to userspace. There, the full sockaddr is copied, even when it is shorter than the full size. This can result in up to 14 uninitialized bytes of kernel memory being copied out to userspace. It is possible for an unprivileged userspace program to leak 14 bytes of a kernel heap allocation to userspace.
History

Fri, 07 Feb 2025 17:45:00 +0000

Type Values Removed Values Added
References

Fri, 31 Jan 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Jan 2025 05:00:00 +0000

Type Values Removed Values Added
Description In some cases, the ktrace facility will log the contents of kernel structures to userspace. In one such case, ktrace dumps a variable-sized sockaddr to userspace. There, the full sockaddr is copied, even when it is shorter than the full size. This can result in up to 14 uninitialized bytes of kernel memory being copied out to userspace. It is possible for an unprivileged userspace program to leak 14 bytes of a kernel heap allocation to userspace.
Title Uninitialized kernel memory disclosure via ktrace(2)
Weaknesses CWE-122
References

cve-icon MITRE

Status: PUBLISHED

Assigner: freebsd

Published: 2025-01-30T04:49:56.482Z

Updated: 2025-02-07T17:02:55.076Z

Reserved: 2025-01-23T01:56:01.677Z

Link: CVE-2025-0662

cve-icon Vulnrichment

Updated: 2025-01-30T15:20:18.729Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-01-30T05:15:10.653

Modified: 2025-02-07T17:15:31.157

Link: CVE-2025-0662

cve-icon Redhat

No data.