FreeBSD -- ktrace kernel memory disclosure
Due to an overlooked merge to -STABLE branches, the size
for page fault kernel trace entries was set incorrectly.
A user who can enable kernel process tracing could end
up reading the contents of kernel memory.
Such memory might contain sensitive information, such
as portions of the file cache or terminal buffers. This
information might be directly useful, or it might be leveraged
to obtain elevated privileges in some way; for example, a
terminal buffer might include a user-entered password.
Copyright © 2003-2005 Jacques Vidrine and contributors.
Please see the source of this document for full copyright