SB2010112906 - Information exposure in Linux kernel char driver
Published: November 29, 2010 Updated: June 20, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Information exposure (CVE-ID: CVE-2010-4077)
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information exposure error within the serial_tiocmset() function in drivers/usb/serial/usb-serial.c, within the uart_wait_modem_status(), uart_get_count() and uart_ioctl() functions in drivers/serial/serial_core.c, within the tty_tiocmset() and tty_ioctl() functions in drivers/char/tty_io.c. A local user can gain access to sensitive information.
Remediation
Install update from vendor's website.
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d281da7ff6f70efca0553c288bb883e8605b3862
- http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03387.html
- http://secunia.com/advisories/42890
- http://securityreason.com/securityalert/8129
- http://www.openwall.com/lists/oss-security/2010/09/25/2
- http://www.openwall.com/lists/oss-security/2010/10/06/6
- http://www.openwall.com/lists/oss-security/2010/10/07/1
- http://www.openwall.com/lists/oss-security/2010/10/25/3
- http://www.redhat.com/support/errata/RHSA-2010-0958.html
- http://www.redhat.com/support/errata/RHSA-2011-0007.html
- http://www.securityfocus.com/bid/45059
- https://bugzilla.redhat.com/show_bug.cgi?id=648663