** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Importance: Undecided => Low
** Changed in: linux-snapdragon (Ubuntu Xenial)
Status: New => Fix Committed
** Changed in: linux-snapdragon (Ubuntu Xenial)
Importance: Undecided => Low
** Changed in: linux-snapdragon (Ubuntu Yakkety)
Importance: Undecided => Low
** Changed in: linux-snapdragon (Ubuntu Trusty)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Trusty)
Importance: Undecided => Low
** Description changed:
- Kernel crashes on invalid USB device descriptors (mct_u232 driver)
+ The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in
+ the Linux kernel before 4.5.1 allows physically proximate attackers to
+ cause a denial of service (NULL pointer dereference and system crash)
+ via a crafted USB device without two interrupt-in endpoint descriptors.
Break-Fix: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
4e9a0b05257f29cf4b75f3209243ed71614d062e
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1556877
Title:
CVE-2016-3136
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1556877/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs