Bug 916191 - (CVE-2013-1774) CVE-2013-1774 Kernel: USB io_ti driver NULL pointer dereference in routine chase_port
CVE-2013-1774 Kernel: USB io_ti driver NULL pointer dereference in routine ch...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20130118,reported=2...
: Security
Depends On: 916198 916200 916201 916202
Blocks: 904394
  Show dependency treegraph
 
Reported: 2013-02-27 09:02 EST by Prasad J Pandit
Modified: 2016-03-04 06:38 EST (History)
27 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2014-06-09 15:01:30 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:


Attachments (Terms of Use)

  None (edit)
Description Prasad J Pandit 2013-02-27 09:02:44 EST
Linux kernel built with Edgeport USB serial converter driver io_ti,
is vulnerable to a NULL pointer dereference flaw. It happens if the device is
disconnected while in use.

A user able to read/write from /dev/ttyUSB? file could use this flaw to crash the system, resulting in DoS.

Upstream fix:
-------------
  -> https://git.kernel.org/linus/1ee0a224bc9aad1de496c795f96bc6ba2c394811
Comment 1 Prasad J Pandit 2013-02-27 09:12:43 EST
Statement:

This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5.

This issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise MRG 2 may address this issue.
Comment 6 errata-xmlrpc 2013-04-23 14:27:31 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2013:0744 https://rhn.redhat.com/errata/RHSA-2013-0744.html
Comment 7 errata-xmlrpc 2013-05-20 12:48:13 EDT
This issue has been addressed in following products:

  MRG for RHEL-6 v.2

Via RHSA-2013:0829 https://rhn.redhat.com/errata/RHSA-2013-0829.html

Note You need to log in before you can comment on or make changes to this bug.