SB2020022040 - Information exposure in Linux kernel filesystems
Published: February 20, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Information exposure (CVE-ID: CVE-2011-4915)
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information exposure error within the proc_set_super() and proc_parse_options() functions in fs/proc/root.c, within the proc_init_inodecache() function in fs/proc/inode.c, within the proc_setattr(), pid_getattr(), proc_flush_task_mnt(), proc_pid_fill_cache() and proc_pid_readdir() functions in fs/proc/base.c. A local user can gain access to sensitive information.
Remediation
Install update from vendor's website.
References
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0499680a42141d86417a8fbaa8c8db806bea1201
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a2ef990ab5a6705a356d146dd773a3b359787497
- http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-4915.html
- http://www.openwall.com/lists/oss-security/2011/11/07/9
- https://lkml.org/lkml/2011/11/7/340
- https://seclists.org/oss-sec/2011/q4/571
- https://security-tracker.debian.org/tracker/CVE-2011-4915
- https://vigilance.fr/vulnerability/Linux-kernel-information-disclosure-about-keyboard-11131