CVE-2010-4074
Publication date 29 November 2010
Last updated 24 July 2024
Ubuntu priority
The USB subsystem in the Linux kernel before 2.6.36-rc5 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to TIOCGICOUNT ioctl calls, and the (1) mos7720_ioctl function in drivers/usb/serial/mos7720.c and (2) mos7840_ioctl function in drivers/usb/serial/mos7840.c.
From the Ubuntu Security Team
Dan Rosenberg discovered that the USB subsystem did not correctly initialize certian structures. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
linux-ec2 | ||
linux-fsl-imx51 | ||
linux-lts-backport-maverick | ||
linux-mvl-dove | ||
linux-source-2.6.15 | ||
linux-ti-omap4 | ||
Patch details
Package | Patch details |
---|---|
linux |
References
Related Ubuntu Security Notices (USN)
- USN-1073-1
- Linux kernel vulnerabilities
- 25 February 2011
- USN-1072-1
- Linux kernel vulnerabilities
- 25 February 2011
- USN-1074-1
- Linux kernel vulnerabilities
- 25 February 2011
- USN-1074-2
- Linux kernel vulnerabilities
- 28 February 2011