CVE-2017-17558

The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel through 4.14.5 does not consider the maximum number of configurations and interfaces before attempting to release resources, which allows local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html Third Party Advisory
http://openwall.com/lists/oss-security/2017/12/12/7 Mailing List Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:1062
https://access.redhat.com/errata/RHSA-2019:1170
https://access.redhat.com/errata/RHSA-2019:1190
https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3754-1/
https://www.debian.org/security/2017/dsa-4073 Third Party Advisory
https://www.debian.org/security/2018/dsa-4082
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.spinics.net/lists/linux-usb/msg163644.html Issue Tracking Patch
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html Third Party Advisory
http://openwall.com/lists/oss-security/2017/12/12/7 Mailing List Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:1062
https://access.redhat.com/errata/RHSA-2019:1170
https://access.redhat.com/errata/RHSA-2019:1190
https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3754-1/
https://www.debian.org/security/2017/dsa-4073 Third Party Advisory
https://www.debian.org/security/2018/dsa-4082
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.spinics.net/lists/linux-usb/msg163644.html Issue Tracking Patch
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:suse:linux_enterprise_server:11:extra:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*

History

21 Nov 2024, 03:18

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html - Third Party Advisory
References () http://openwall.com/lists/oss-security/2017/12/12/7 - Mailing List, Third Party Advisory () http://openwall.com/lists/oss-security/2017/12/12/7 - Mailing List, Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:0676 - () https://access.redhat.com/errata/RHSA-2018:0676 -
References () https://access.redhat.com/errata/RHSA-2018:1062 - () https://access.redhat.com/errata/RHSA-2018:1062 -
References () https://access.redhat.com/errata/RHSA-2019:1170 - () https://access.redhat.com/errata/RHSA-2019:1170 -
References () https://access.redhat.com/errata/RHSA-2019:1190 - () https://access.redhat.com/errata/RHSA-2019:1190 -
References () https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html - () https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html -
References () https://usn.ubuntu.com/3619-1/ - () https://usn.ubuntu.com/3619-1/ -
References () https://usn.ubuntu.com/3619-2/ - () https://usn.ubuntu.com/3619-2/ -
References () https://usn.ubuntu.com/3754-1/ - () https://usn.ubuntu.com/3754-1/ -
References () https://www.debian.org/security/2017/dsa-4073 - Third Party Advisory () https://www.debian.org/security/2017/dsa-4073 - Third Party Advisory
References () https://www.debian.org/security/2018/dsa-4082 - () https://www.debian.org/security/2018/dsa-4082 -
References () https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html - () https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -
References () https://www.spinics.net/lists/linux-usb/msg163644.html - Issue Tracking, Patch () https://www.spinics.net/lists/linux-usb/msg163644.html - Issue Tracking, Patch

Information

Published : 2017-12-12 15:29

Updated : 2024-11-21 03:18


NVD link : CVE-2017-17558

Mitre link : CVE-2017-17558

CVE.ORG link : CVE-2017-17558


JSON object : View

Products Affected

suse

  • linux_enterprise_server

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write