Certain USB drivers in the Linux 2.4 kernel use the copy_to_user function on uninitialized structures, which could allow local users to obtain sensitive information by reading memory that was not cleared from previous usage.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10665
https://exchange.xforce.ibmcloud.com/vulnerabilities/16931
https://bugzilla.fedora.us/show_bug.cgi?id=2336
http://www.trustix.net/errata/2004/0041/
http://www.securityspace.com/smysecure/catid.html?id=14580
http://www.securityfocus.com/bid/10892
http://www.redhat.com/support/errata/RHSA-2004-505.html
http://www.redhat.com/support/errata/RHSA-2004-504.html
http://www.kb.cert.org/vuls/id/981134
http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml
http://www.debian.org/security/2006/dsa-1082
http://www.debian.org/security/2006/dsa-1070
http://www.debian.org/security/2006/dsa-1069
http://www.debian.org/security/2006/dsa-1067
http://secunia.com/advisories/20338
http://secunia.com/advisories/20202
http://secunia.com/advisories/20163