An out-of-bound access issue was discovered in yurex_read() in drivers/usb/misc/yurex.c in the Linux kernel. A local attacker could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges. References: https://marc.info/?t=153089016500001&r=1&w=2 https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.17.7 An upstream patch: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f1e255d60ae66a9f672ff9a207ee6cd8e33d2679
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1624508]
This was fixed for Fedora with the 4.17.7 stable updates.
Note: No Red Hat products are vulnerable to this flaw, as the yurex driver is not shipped.
*** Bug 1651061 has been marked as a duplicate of this bug. ***