First published: Mon Mar 14 2011(Updated: )
[PATCH 1/3] char/tpm: Fix uninitialized usage of data buffer <a href="http://tpmdd.git.sourceforge.net/git/gitweb.cgi?p=tpmdd/tpmdd;a=commitdiff;h=459e0537ebb7b786cd29a26f4e41c721632cd840">http://tpmdd.git.sourceforge.net/git/gitweb.cgi?p=tpmdd/tpmdd;a=commitdiff;h=459e0537ebb7b786cd29a26f4e41c721632cd840</a> infoleak [PATCH 2/3] char/tpm: Call tpm_transmit with correct size <a href="http://tpmdd.git.sourceforge.net/git/gitweb.cgi?p=tpmdd/tpmdd;a=commitdiff;h=f0bbed1ee49a4779dfb32159fea669ced8789336">http://tpmdd.git.sourceforge.net/git/gitweb.cgi?p=tpmdd/tpmdd;a=commitdiff;h=f0bbed1ee49a4779dfb32159fea669ced8789336</a> infoleak [PATCH 3/3] char/tpm: zero buffer after copying to userspace <a href="http://tpmdd.git.sourceforge.net/git/gitweb.cgi?p=tpmdd/tpmdd;a=commitdiff;h=44480e4077cd782aa8f54eb472b292547f030520">http://tpmdd.git.sourceforge.net/git/gitweb.cgi?p=tpmdd/tpmdd;a=commitdiff;h=44480e4077cd782aa8f54eb472b292547f030520</a> prevents storing of previous result, leakage to other drivers Acknowledgements: Red Hat would like to thank Peter Huewe for reporting this issue.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | =2.6.38-rc7 | |
Linux Linux kernel | =2.6.38-rc6 | |
Linux Linux kernel | =2.6.38-rc4 | |
Linux Linux kernel | =2.6.38.3 | |
Linux Linux kernel | <=2.6.38.8 | |
Linux Linux kernel | =2.6.38-rc3 | |
Linux Linux kernel | =2.6.38-rc5 | |
Linux Linux kernel | =2.6.38-rc2 | |
Linux Linux kernel | =2.6.38.6 | |
Linux Linux kernel | =2.6.38.1 | |
Linux Linux kernel | =2.6.38-rc1 | |
Linux Linux kernel | =2.6.38.5 | |
Linux Linux kernel | =2.6.38.2 | |
Linux Linux kernel | =2.6.38 | |
Linux Linux kernel | =2.6.38-rc8 | |
Linux Linux kernel | =2.6.38.4 | |
Linux Linux kernel | =2.6.38.7 | |
debian/linux-2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.