CVE-2017-16914

The "stub_send_ret_submit()" function (drivers/usb/usbip/stub_tx.c) in the Linux Kernel before version 4.14.8, 4.9.71, 4.1.49, and 4.4.107 allows attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet.
References
Link Resource
http://www.securityfocus.com/bid/102150 Third Party Advisory VDB Entry
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.49 Issue Tracking
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8 Issue Tracking
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.107 Issue Tracking
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.71 Issue Tracking
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/drivers/usb/usbip?id=be6123df1ea8f01ee2f896a16c2b7be3e4557a5a Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://secuniaresearch.flexerasoftware.com/advisories/80722/ Third Party Advisory
https://secuniaresearch.flexerasoftware.com/secunia_research/2017-21/ Third Party Advisory
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3754-1/
https://www.debian.org/security/2018/dsa-4187
https://www.spinics.net/lists/linux-usb/msg163480.html Issue Tracking Third Party Advisory
http://www.securityfocus.com/bid/102150 Third Party Advisory VDB Entry
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.49 Issue Tracking
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8 Issue Tracking
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.107 Issue Tracking
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.71 Issue Tracking
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/drivers/usb/usbip?id=be6123df1ea8f01ee2f896a16c2b7be3e4557a5a Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://secuniaresearch.flexerasoftware.com/advisories/80722/ Third Party Advisory
https://secuniaresearch.flexerasoftware.com/secunia_research/2017-21/ Third Party Advisory
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3754-1/
https://www.debian.org/security/2018/dsa-4187
https://www.spinics.net/lists/linux-usb/msg163480.html Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:17

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/102150 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/102150 - Third Party Advisory, VDB Entry
References () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.49 - Issue Tracking () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.49 - Issue Tracking
References () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8 - Issue Tracking () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8 - Issue Tracking
References () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.107 - Issue Tracking () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.107 - Issue Tracking
References () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.71 - Issue Tracking () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.71 - Issue Tracking
References () https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/drivers/usb/usbip?id=be6123df1ea8f01ee2f896a16c2b7be3e4557a5a - Patch, Vendor Advisory () https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/drivers/usb/usbip?id=be6123df1ea8f01ee2f896a16c2b7be3e4557a5a - Patch, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html - () https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html -
References () https://secuniaresearch.flexerasoftware.com/advisories/80722/ - Third Party Advisory () https://secuniaresearch.flexerasoftware.com/advisories/80722/ - Third Party Advisory
References () https://secuniaresearch.flexerasoftware.com/secunia_research/2017-21/ - Third Party Advisory () https://secuniaresearch.flexerasoftware.com/secunia_research/2017-21/ - Third Party Advisory
References () https://usn.ubuntu.com/3619-1/ - () https://usn.ubuntu.com/3619-1/ -
References () https://usn.ubuntu.com/3619-2/ - () https://usn.ubuntu.com/3619-2/ -
References () https://usn.ubuntu.com/3754-1/ - () https://usn.ubuntu.com/3754-1/ -
References () https://www.debian.org/security/2018/dsa-4187 - () https://www.debian.org/security/2018/dsa-4187 -
References () https://www.spinics.net/lists/linux-usb/msg163480.html - Issue Tracking, Third Party Advisory () https://www.spinics.net/lists/linux-usb/msg163480.html - Issue Tracking, Third Party Advisory

Information

Published : 2018-01-31 22:29

Updated : 2024-11-21 03:17


NVD link : CVE-2017-16914

Mitre link : CVE-2017-16914

CVE.ORG link : CVE-2017-16914


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference