First published: Sat Sep 13 2014(Updated: )
Linux kernel built with the USB Serial Converter support(USB_SERIAL) along with a USB ConnectTech WhiteHEAT Serial Driver(CONFIG_USB_SERIAL_WHITEHEAT) is vulnerable to a memory corruption flaw. It could occur when reading completion commands via USB Request Blocks buffers. A local user with physical access to the system could use this flaw to corrupt kernel memory area or crash the system kernel resulting in DoS. Upstream fix: ------------- -> <a href="https://git.kernel.org/linus/6817ae225cd650fb1c3295d769298c38b1eba818">https://git.kernel.org/linus/6817ae225cd650fb1c3295d769298c38b1eba818</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | ||
Linux USB Serial Converter support | ||
Linux USB ConnectTech WhiteHEAT Serial Driver |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1141400 is classified as a memory corruption flaw that can potentially lead to privilege escalation for local users.
To fix REDHAT-BUG-1141400, users should update to the latest kernel version that addresses this vulnerability.
REDHAT-BUG-1141400 affects users running the Linux kernel with USB Serial Converter support and USB ConnectTech WhiteHEAT Serial Driver.
The impact of REDHAT-BUG-1141400 could allow local users to execute arbitrary code with elevated privileges.
A potential workaround for REDHAT-BUG-1141400 is to disable the USB ConnectTech WhiteHEAT Serial Driver, but this may affect connected devices.