Candidate: CVE-2004-0685 References: FEDORA:FLSA:2336 URL:https://bugzilla.fedora.us/show_bug.cgi?id=2336 GENTOO:GLSA-200408-24 URL:http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml TRUSTIX:2004-0041 URL:http://www.trustix.net/errata/2004/0041/ CONFIRM:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127921 CERT-VN:VU#981134 URL:http://www.kb.cert.org/vuls/id/981134 BID:10892 URL:http://www.securityfocus.com/bid/10892 XF:linux-usb-gain-privileges(16931) URL:http://xforce.iss.net/xforce/xfdb/16931 MISC:http://www.securityspace.com/smysecure/catid.html?id=14580 Description: Certain USB drivers in the Linux 2.4 kernel use the copy_to_user function on uninitialized structures, which could allow local users to obtain sensitive information by reading memory that was not cleared from previous usage. Notes: jmm> This was commited into the 2.5/2.6 version before in this changeset: jmm> http://linux.bkbits.net:8080/linux-2.6/cset@3f986b35LyBKc-OxB8G6k22oOjgYTQ jmm> So I'm marking all 2.6 versions N/A Bugs: upstream: released (2.4.27) linux-2.6: N/A 2.6.8-sarge-security: N/A 2.4.27-sarge-security: N/A 2.4.19-woody-security: released (2.4.19-4.woody3) 2.4.18-woody-security: released (2.4.18-14.4) 2.4.17-woody-security: released (2.4.17-1woody4) 2.4.16-woody-security: released (2.4.16-1woody3) 2.4.17-woody-security-hppa: released (32.5) 2.4.17-woody-security-ia64: released (011226.18) 2.4.18-woody-security-hppa: released (62.4)