Vulnerability Name: | CVE-2016-5400 (CCN-115514) | ||||||||||||||||||||
Assigned: | 2016-07-24 | ||||||||||||||||||||
Published: | 2016-07-24 | ||||||||||||||||||||
Updated: | 2017-09-01 | ||||||||||||||||||||
Summary: | Memory leak in the airspy_probe function in drivers/media/usb/airspy/airspy.c in the airspy USB driver in the Linux kernel before 4.7 allows local users to cause a denial of service (memory consumption) via a crafted USB device that emulates many VFL_TYPE_SDR or VFL_TYPE_SUBDEV devices and performs many connect and disconnect operations. | ||||||||||||||||||||
CVSS v3 Severity: | 4.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) 3.8 Low (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
5.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||
CVSS v2 Severity: | 4.9 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)
| ||||||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-5400 Source: CONFIRM Type: Issue Tracking, Patch http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=aa93d1fee85c890a34f2510a310e55ee76a27848 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20160725 CVE-2016-5400 - linux kernel: denial of service in airspy USB driver. Source: BID Type: UNKNOWN 92104 Source: CCN Type: BID-92104 Linux Kernel CVE-2016-5400 Local Denial of Service Vulnerability Source: SECTRACK Type: UNKNOWN 1036432 Source: UBUNTU Type: UNKNOWN USN-3070-1 Source: UBUNTU Type: UNKNOWN USN-3070-2 Source: UBUNTU Type: UNKNOWN USN-3070-3 Source: UBUNTU Type: UNKNOWN USN-3070-4 Source: CONFIRM Type: Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=1358184 Source: CCN Type: Red Hat Bugzilla Bug 1358184 (CVE-2016-5400) CVE-2016-5400 kernel: memory leak in airspy usb driver Source: XF Type: UNKNOWN linux-kernel-cve20165400-dos(115514) Source: CCN Type: Linux TV GIT Repository apply mask to val after checking for read failure Source: CONFIRM Type: Issue Tracking, Patch https://github.com/torvalds/linux/commit/aa93d1fee85c890a34f2510a310e55ee76a27848 Source: CCN Type: WhiteSource Vulnerability Database CVE-2016-5400 | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |