No analysis available yet.
Default status is the baseline for the product, each version can override it (e.g. patched versions marked unaffected).
| Vendor | Product | Default status | Versions | ||||||
|---|---|---|---|---|---|---|---|---|---|
| n/a | n/a | affected |
|
Configuration 1 [-]
|
| Package | CPE | Advisory | Released Date |
|---|---|---|---|
| MRG for RHEL-5 | |||
| kernel-rt-0:2.6.24.7-161.el5rt | cpe:/a:redhat:enterprise_mrg:1::el5 | RHSA-2010:0631 | 2010-08-17T00:00:00Z |
| Red Hat Enterprise Linux 4 | |||
| kernel-0:2.6.9-89.0.25.EL | cpe:/o:redhat:enterprise_linux:4 | RHSA-2010:0394 | 2010-05-05T00:00:00Z |
| Red Hat Enterprise Linux 5 | |||
| kernel-0:2.6.18-194.17.1.el5 | cpe:/o:redhat:enterprise_linux:5 | RHSA-2010:0723 | 2010-09-29T00:00:00Z |
No data available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2053-1 | New Linux 2.6.26 packages fix several issues |
EUVD |
EUVD-2010-1115 | The processcompl_compat function in drivers/usb/core/devio.c in Linux kernel 2.6.x through 2.6.32, and possibly other versions, does not clear the transfer buffer before returning to userspace when a USB command fails, which might make it easier for physically proximate attackers to obtain sensitive information (kernel memory). |
Ubuntu USN |
USN-947-1 | Linux kernel vulnerabilities |
No CVSS v4.0
No CVSS v3.1
No CVSS v3.0
Access Vector Local
Access Complexity Medium
Authentication None
Confidentiality Impact Complete
Integrity Impact None
Availability Impact None
This CVE is not in the KEV list.
The EPSS score is 0.00073.
Key SSVC decision points have not yet been added.
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T01:14:05.863Z
Reserved: 2010-03-23T00:00:00.000Z
Link: CVE-2010-1083
No data.
Status : Deferred
Published: 2010-04-06T22:30:00.483
Modified: 2025-04-11T00:51:21.963
Link: CVE-2010-1083
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN