Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 314677 (CVE-2010-1083)

Summary: Kernel: kernel memory leak (CVE-2010-1083)
Product: Gentoo Security Reporter: Stefan Behte (RETIRED) <craig>
Component: KernelAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: normal CC: hardened-kernel+disabled, kernel
Priority: High    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=ddeee0b2eec2a51b0712b04de4b39e7bec892a53
Whiteboard: [ linux < 2.6.33 ]
Package list:
Runtime testing required: ---

Description Stefan Behte (RETIRED) gentoo-dev Security 2010-04-11 14:09:17 UTC
CVE-2010-1083 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1083):
  The processcompl_compat function in drivers/usb/core/devio.c in Linux
  kernel 2.6.x through 2.6.32, and possibly other versions, does not
  clear the transfer buffer before returning to userspace when a USB
  command fails, which might make it easier for physically proximate
  attackers to obtain sensitive information (kernel memory).