** Changed in: linux-snapdragon (Ubuntu Precise)
       Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Precise)
   Importance: Undecided => Low

** Changed in: linux-snapdragon (Ubuntu Wily)
       Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Wily)
   Importance: Undecided => Low

** Changed in: linux-snapdragon (Ubuntu Xenial)
       Status: New => Fix Committed

** Changed in: linux-snapdragon (Ubuntu Xenial)
   Importance: Undecided => Low

** Changed in: linux-snapdragon (Ubuntu Yakkety)
   Importance: Undecided => Low

** Changed in: linux-snapdragon (Ubuntu Trusty)
       Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Trusty)
   Importance: Undecided => Low

** Description changed:

- Kernel crashes on invalid USB device descriptors (mct_u232 driver)
+ The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in
+ the Linux kernel before 4.5.1 allows physically proximate attackers to
+ cause a denial of service (NULL pointer dereference and system crash)
+ via a crafted USB device without two interrupt-in endpoint descriptors.
  
  Break-Fix: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
  4e9a0b05257f29cf4b75f3209243ed71614d062e

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1556877

Title:
  CVE-2016-3136

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1556877/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to