The Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_LOGITECH_FF, CONFIG_LOGIG940_FF, or CONFIG_LOGIWHEELS_FF is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device, related to (1) drivers/hid/hid-lgff.c, (2) drivers/hid/hid-lg3ff.c, and (3) drivers/hid/hid-lg4ff.c.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html - | |
References | () http://marc.info/?l=linux-input&m=137772186714627&w=1Â - | |
References | () http://openwall.com/lists/oss-security/2013/08/28/13Â - | |
References | () http://rhn.redhat.com/errata/RHSA-2013-1490.html - | |
References | () http://www.securityfocus.com/bid/62050Â - | |
References | () http://www.ubuntu.com/usn/USN-2015-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2016-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2019-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2020-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2021-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2022-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2023-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2024-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2038-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2039-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2050-1Â - |
07 Nov 2023, 02:15
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.ubuntu.com/usn/USN-2050-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2019-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2021-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2022-1Â - | |
References | () http://www.securityfocus.com/bid/62050Â - | |
References | () http://www.ubuntu.com/usn/USN-2024-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2016-1Â - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html - | |
References | () http://openwall.com/lists/oss-security/2013/08/28/13Â - | |
References | () http://marc.info/?l=linux-input&m=137772186714627&w=1Â - | |
References | () http://www.ubuntu.com/usn/USN-2020-1Â - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html - | |
References | () http://www.ubuntu.com/usn/USN-2038-1Â - | |
References | () http://rhn.redhat.com/errata/RHSA-2013-1490.html - | |
References | () http://www.ubuntu.com/usn/USN-2039-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2015-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2023-1Â - |
Information
Published : 2013-09-16 13:01
Updated : 2024-11-21 01:52
NVD link : CVE-2013-2893
Mitre link : CVE-2013-2893
CVE.ORG link : CVE-2013-2893
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer