First published: Tue Aug 23 2011(Updated: )
<a href="https://access.redhat.com/security/cve/CVE-2011-1162">CVE-2011-1162</a> [PATCH 3/3] char/tpm: zero buffer after copying to userspace <a href="http://tpmdd.git.sourceforge.net/git/gitweb.cgi?p=tpmdd/tpmdd;a=commitdiff;h=44480e4077cd782aa8f54eb472b292547f030520">http://tpmdd.git.sourceforge.net/git/gitweb.cgi?p=tpmdd/tpmdd;a=commitdiff;h=44480e4077cd782aa8f54eb472b292547f030520</a> prevents storing of previous result, leakage to other drivers [Update 2011-10-11] <a href="https://access.redhat.com/security/cve/CVE-2011-1161">CVE-2011-1161</a> rejected. Please see <a href="show_bug.cgi?id=732629#c14">comment #14</a> for more info. Acknowledgements: Red Hat would like to thank Peter Huewe for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux kernel | =2.6 | |
Linux Kernel | =2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1162 has a moderate severity rating as it involves a potential information leak in the Linux kernel.
To fix CVE-2011-1162, you should apply the appropriate patches provided for the affected Linux kernel versions.
CVE-2011-1162 affects systems running Linux kernel version 2.6.
CVE-2011-1162 is classified as a memory corruption vulnerability due to improper handling of user space buffers.
CVE-2011-1162 is typically not considered remotely exploitable as it requires a local user to trigger the vulnerability.