First published: Wed Nov 25 2015(Updated: )
An out-of-bounds memory access flaw was found in aiptek USB tablet driver in aiptek_probe() function in drivers/input/tablet/aiptek.c. The driver assumes that the interface always has at least one endpoint. By using a specially crafted USB device with no endpoints on one of its interfaces an unprivileged user with a physical access to the system can trigger a kernel NULL pointer dereference causing the system to panic. Acknowledgements: Red Hat would like to thank Ralf Spenneberg of OpenSource Security for reporting this issue. References: Proposed upstream patch: <a href="http://www.spinics.net/lists/linux-input/msg42294.html">http://www.spinics.net/lists/linux-input/msg42294.html</a> Upstream patch: <a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8e20cf2bce122ce9262d6034ee5d5b76fbb92f96">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8e20cf2bce122ce9262d6034ee5d5b76fbb92f96</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <4.4 | |
Linux Linux kernel | =4.4-rc1 | |
Linux Linux kernel | =4.4-rc2 | |
Linux Linux kernel | =4.4-rc3 | |
Linux Linux kernel | =4.4-rc4 | |
Linux Linux kernel | =4.4-rc5 | |
Linux Linux kernel | =4.4-rc6 | |
Linux Linux kernel | =4.4-rc7 | |
Linux Linux kernel | =4.4-rc8 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2015-7515.
The severity of CVE-2015-7515 is low.
CVE-2015-7515 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device that lacks endpoints.
The Linux kernel versions before 4.4 are affected by CVE-2015-7515.
Yes, the fix for CVE-2015-7515 is available in Linux kernel version 4.4 and above.