CVE-2009-4067
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2009-4067 is a buffer overflow vulnerability discovered in the auerswald_probe function within the Auerswald Linux USB driver for Linux kernel versions before 2.6.27. The vulnerability affects the handling of USB string descriptors in the Auerswald PBX/System Telephone USB driver implementation (NVD, Red Hat).

Technical details

The vulnerability exists in the auerswald_probe function where it incorrectly handles lengths of the USB string descriptors. The issue was present in the Linux kernel's Auerswald PBX/System Telephone USB driver implementation. The vulnerable code was completely removed from the kernel in version 2.6.27 rather than being patched (Red Hat Bugzilla).

Impact

A local attacker with physical access to the system could exploit this vulnerability by inserting a specially crafted USB device to gain root privileges on the affected system (Ubuntu Notice).

Mitigation and workarounds

The primary mitigation was the removal of the affected driver code in Linux kernel version 2.6.27. For systems running older kernel versions, updates were provided by various distributions. For example, Ubuntu 8.04 users were advised to update to linux-image-2.6.24-29 packages, and a system reboot was required to apply the changes (Ubuntu Notice).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-71142N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-debug-devel-matched
NoNoJan 14, 2026
CVE-2025-71137N/AN/A
  • Linux KernelLinux Kernel
  • linux-gcp
NoYesJan 14, 2026
CVE-2025-71135N/AN/A
  • Linux KernelLinux Kernel
  • kernel-debug-core
NoNoJan 14, 2026
CVE-2025-71134N/AN/A
  • Linux KernelLinux Kernel
  • kernel-uki-virt
NoNoJan 14, 2026
CVE-2025-71133N/AN/A
  • Linux KernelLinux Kernel
  • kernel-modules-extra
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management