#VU92585 Information exposure in Linux kernel - CVE-2010-4077
Published: November 29, 2010 / Updated: June 20, 2024
Linux kernel
Linux Foundation
Description
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information exposure error within the serial_tiocmset() function in drivers/usb/serial/usb-serial.c, within the uart_wait_modem_status(), uart_get_count() and uart_ioctl() functions in drivers/serial/serial_core.c, within the tty_tiocmset() and tty_ioctl() functions in drivers/char/tty_io.c. A local user can gain access to sensitive information.
Remediation
External links
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d281da7ff6f70efca0553c288bb883e8605b3862
- http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03387.html
- http://secunia.com/advisories/42890
- http://securityreason.com/securityalert/8129
- http://www.openwall.com/lists/oss-security/2010/09/25/2
- http://www.openwall.com/lists/oss-security/2010/10/06/6
- http://www.openwall.com/lists/oss-security/2010/10/07/1
- http://www.openwall.com/lists/oss-security/2010/10/25/3
- http://www.redhat.com/support/errata/RHSA-2010-0958.html
- http://www.redhat.com/support/errata/RHSA-2011-0007.html
- http://www.securityfocus.com/bid/45059
- https://bugzilla.redhat.com/show_bug.cgi?id=648663