The USB subsystem in the Linux kernel before 2.6.36-rc5 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to TIOCGICOUNT ioctl calls, and the (1) mos7720_ioctl function in drivers/usb/serial/mos7720.c and (2) mos7840_ioctl function in drivers/usb/serial/mos7840.c.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2126-1 | New Linux 2.6.26 packages fix several issues |
EUVD |
EUVD-2010-4050 | The USB subsystem in the Linux kernel before 2.6.36-rc5 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to TIOCGICOUNT ioctl calls, and the (1) mos7720_ioctl function in drivers/usb/serial/mos7720.c and (2) mos7840_ioctl function in drivers/usb/serial/mos7840.c. |
Ubuntu USN |
USN-1072-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1073-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1074-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1074-2 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T03:34:37.692Z
Reserved: 2010-10-25T00:00:00
Link: CVE-2010-4074
No data.
Status : Deferred
Published: 2010-11-29T16:00:02.900
Modified: 2025-04-11T00:51:21.963
Link: CVE-2010-4074
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN