CVE-2010-4074

Published: 29 November 2010

The USB subsystem in the Linux kernel before 2.6.36-rc5 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to TIOCGICOUNT ioctl calls, and the (1) mos7720_ioctl function in drivers/usb/serial/mos7720.c and (2) mos7840_ioctl function in drivers/usb/serial/mos7840.c.

From the Ubuntu security team

Dan Rosenberg discovered that the USB subsystem did not correctly initialize certian structures. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy.

Priority

Low

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.36~rc5)
Patches:
Upstream: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a0846f1868b11cd827bdfeaf4527d8b1b1c0b098
linux-ec2
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.36~rc5)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.36~rc5)
linux-lts-backport-maverick
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.36~rc5)
linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.36~rc5)
linux-source-2.6.15
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.36~rc5)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.36~rc5)