CVE-2011-4915
Published: 20 February 2020
fs/proc/base.c in the Linux kernel through 3.1 allows local users to obtain sensitive keystroke information via access to /proc/interrupts.
Priority
CVSS 3 base score: 5.5
Status
Package | Release | Status |
---|---|---|
linux Launchpad, Ubuntu, Debian |
Upstream |
Ignored
(upstream determined we have sufficient facilities already)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Ignored
(upstream determined we have sufficient facilities already)
|
|
linux-armadaxp Launchpad, Ubuntu, Debian |
Upstream |
Ignored
(upstream determined we have sufficient facilities already)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
This package is not directly supported by the Ubuntu Security Team | ||
linux-ec2 Launchpad, Ubuntu, Debian |
Upstream |
Ignored
(upstream determined we have sufficient facilities already)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-flo Launchpad, Ubuntu, Debian |
Upstream |
Ignored
(upstream determined we have sufficient facilities already)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was ignored [upstream determined we have sufficient facilities already])
|
|
linux-fsl-imx51 Launchpad, Ubuntu, Debian |
Upstream |
Ignored
(upstream determined we have sufficient facilities already)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-goldfish Launchpad, Ubuntu, Debian |
Upstream |
Ignored
(upstream determined we have sufficient facilities already)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was ignored [upstream determined we have sufficient facilities already])
|
|
linux-grouper Launchpad, Ubuntu, Debian |
Upstream |
Ignored
(upstream determined we have sufficient facilities already)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was ignored [upstream determined we have sufficient facilities already])
|
|
linux-lts-backport-maverick Launchpad, Ubuntu, Debian |
Upstream |
Ignored
(upstream determined we have sufficient facilities already)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-lts-backport-natty Launchpad, Ubuntu, Debian |
Upstream |
Ignored
(upstream determined we have sufficient facilities already)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-lts-backport-oneiric Launchpad, Ubuntu, Debian |
Upstream |
Ignored
(upstream determined we have sufficient facilities already)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-lts-quantal Launchpad, Ubuntu, Debian |
Upstream |
Does not exist
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
Patches: DNE |
||
linux-lts-raring Launchpad, Ubuntu, Debian |
Upstream |
Ignored
(upstream determined we have sufficient facilities already)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-lts-saucy Launchpad, Ubuntu, Debian |
Upstream |
Ignored
(upstream determined we have sufficient facilities already)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-maguro Launchpad, Ubuntu, Debian |
Upstream |
Ignored
(upstream determined we have sufficient facilities already)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was ignored [upstream determined we have sufficient facilities already])
|
|
linux-mako Launchpad, Ubuntu, Debian |
Upstream |
Ignored
(upstream determined we have sufficient facilities already)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was ignored [upstream determined we have sufficient facilities already])
|
|
linux-manta Launchpad, Ubuntu, Debian |
Upstream |
Ignored
(upstream determined we have sufficient facilities already)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was ignored [upstream determined we have sufficient facilities already])
|
|
linux-mvl-dove Launchpad, Ubuntu, Debian |
Upstream |
Ignored
(upstream determined we have sufficient facilities already)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-ti-omap4 Launchpad, Ubuntu, Debian |
Upstream |
Ignored
(upstream determined we have sufficient facilities already)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
Notes
Author | Note |
---|---|
apw | kernel side this is likely fixed by the commits below, we likely either also need a local patch to change defaults or userspace work to ensure appropriate mount options: 0499680a42141d86417a8fbaa8c8db806bea1201 a2ef990ab5a6705a356d146dd773a3b359787497 They also need some chmoding. But basically upstream says that we have what we needed for these. |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4915
- https://lkml.org/lkml/2011/11/7/340
- NVD
- Launchpad
- Debian