Описание
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise MRG 1 | realtime-kernel | Affected | ||
Red Hat Enterprise Linux 5 | kernel | Fixed | RHSA-2011:1386 | 20.10.2011 |
Red Hat Enterprise Linux 6 | kernel | Fixed | RHSA-2011:1350 | 05.10.2011 |
Red Hat Enterprise MRG 2 | kernel-rt | Fixed | RHSA-2011:1253 | 12.09.2011 |
Показывать по
Дополнительная информация
Статус:
EPSS
1.2 Low
CVSS2
Связанные уязвимости
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel be ...
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
ELSA-2011-1350: kernel security, bug fix, and enhancement update (IMPORTANT)
EPSS
1.2 Low
CVSS2