Problem Description:
The implementation of the TIOCGSERIAL ioctl(2) does not
clear the output struct before copying it out to userland.
The implementation of the Linux sysinfo() system call
does not clear the output struct before copying it out to
userland.
Impact:
An unprivileged user can read a portion of uninitialised
kernel stack data, which may contain sensitive information,
such as the stack guard, portions of the file cache or
terminal buffers, which an attacker might leverage to obtain
elevated privileges.