First published: Wed Sep 23 2015(Updated: )
A vulnerability in WhiteHEAT USB Serial Driver in "whiteheat_attach" function in drivers/usb/serial/whiteheat.c was found. In the driver, the “COMMAND_PORT” variable is hard coded and is set to “4” (5th element). The driver assumes that the number of ports will always be 5 and takes the port number 5 as the command port. But using a specially made USB device in which the number of ports is set to a number less than 5 (e.g. 3), it triggers kernel NULL pointer dereference causing the system to freeze. Disclosure post (including crash report logs): <a href="http://seclists.org/oss-sec/2015/q3/629">http://seclists.org/oss-sec/2015/q3/629</a> Statement: This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG-2. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: <a href="https://access.redhat.com/support/policy/updates/errata/">https://access.redhat.com/support/policy/updates/errata/</a>.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=4.2.3 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.12.6-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Linux kernel vulnerability is CVE-2015-5257.
The severity level of vulnerability CVE-2015-5257 is low.
Vulnerability CVE-2015-5257 allows physically proximate attackers to cause a denial of service or potentially have other unspecified impact via a crafted USB device.
Vulnerability CVE-2015-5257 affects the Linux kernel before version 4.2.4.
To fix vulnerability CVE-2015-5257, update your Linux kernel to version 4.2.4 or later.