** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/706149

Title:
  CVE-2010-4074

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released
Status in linux source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux source package in Karmic:
  Fix Released

Bug description:
  The USB subsystem in the Linux kernel before 2.6.36-rc5 does not
  properly initialize certain structure members, which allows local
  users to obtain potentially sensitive information from kernel stack
  memory via vectors related to TIOCGICOUNT ioctl calls, and the (1)
  mos7720_ioctl function in drivers/usb/serial/mos7720.c and (2)
  mos7840_ioctl function in drivers/usb/serial/mos7840.c.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/706149/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to