CVE-2011-4915

fs/proc/base.c in the Linux kernel through 3.1 allows local users to obtain sensitive keystroke information via access to /proc/interrupts.
References
Link Resource
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0499680a42141d86417a8fbaa8c8db806bea1201 Patch Vendor Advisory
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a2ef990ab5a6705a356d146dd773a3b359787497 Patch Vendor Advisory
http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-4915.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2011/11/07/9 Exploit Mailing List Third Party Advisory
https://lkml.org/lkml/2011/11/7/340 Vendor Advisory
https://seclists.org/oss-sec/2011/q4/571 Mailing List Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2011-4915 Third Party Advisory
https://vigilance.fr/vulnerability/Linux-kernel-information-disclosure-about-keyboard-11131 Third Party Advisory
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0499680a42141d86417a8fbaa8c8db806bea1201 Patch Vendor Advisory
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a2ef990ab5a6705a356d146dd773a3b359787497 Patch Vendor Advisory
http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-4915.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2011/11/07/9 Exploit Mailing List Third Party Advisory
https://lkml.org/lkml/2011/11/7/340 Vendor Advisory
https://seclists.org/oss-sec/2011/q4/571 Mailing List Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2011-4915 Third Party Advisory
https://vigilance.fr/vulnerability/Linux-kernel-information-disclosure-about-keyboard-11131 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:33

Type Values Removed Values Added
References () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0499680a42141d86417a8fbaa8c8db806bea1201 - Patch, Vendor Advisory () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0499680a42141d86417a8fbaa8c8db806bea1201 - Patch, Vendor Advisory
References () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a2ef990ab5a6705a356d146dd773a3b359787497 - Patch, Vendor Advisory () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a2ef990ab5a6705a356d146dd773a3b359787497 - Patch, Vendor Advisory
References () http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-4915.html - Third Party Advisory () http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-4915.html - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2011/11/07/9 - Exploit, Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2011/11/07/9 - Exploit, Mailing List, Third Party Advisory
References () https://lkml.org/lkml/2011/11/7/340 - Vendor Advisory () https://lkml.org/lkml/2011/11/7/340 - Vendor Advisory
References () https://seclists.org/oss-sec/2011/q4/571 - Mailing List, Third Party Advisory () https://seclists.org/oss-sec/2011/q4/571 - Mailing List, Third Party Advisory
References () https://security-tracker.debian.org/tracker/CVE-2011-4915 - Third Party Advisory () https://security-tracker.debian.org/tracker/CVE-2011-4915 - Third Party Advisory
References () https://vigilance.fr/vulnerability/Linux-kernel-information-disclosure-about-keyboard-11131 - Third Party Advisory () https://vigilance.fr/vulnerability/Linux-kernel-information-disclosure-about-keyboard-11131 - Third Party Advisory

Information

Published : 2020-02-20 18:15

Updated : 2024-11-21 01:33


NVD link : CVE-2011-4915

Mitre link : CVE-2011-4915

CVE.ORG link : CVE-2011-4915


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel

canonical

  • ubuntu_linux
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor