The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel allows local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial device) to trigger an integer underflow. Upstream patch: https://github.com/torvalds/linux/commit/654b404f2a222f918af9b0cd18ad469d0c941a8e
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1457217]
Statement: Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates of the Red Hat products. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
This was fixed for Fedora with the 4.11 rebases.