VOMIT (go/vomit) has received an external vulnerability report for the Linux kernel.
Advisory: CVE-2018-5814
Details: http://vomit.googleplex.com/advisory?id=CVE/CVE-2018-5814
CVSS severity score: 6.9/10.0
Description:
In the Linux Kernel before version 4.16.11, 4.14.43, 4.9.102, and 4.4.133, multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets.
This bug was filed by http://go/vomit
Please contact us at vomit-team@google.com if you need any assistance.
Comment 1 by zsm@google.com
, Aug 9Labels: Security_Severity-Medium Security_Impact-Stable Pri-2
Owner: zsm@chromium.org
Status: Assigned (was: Untriaged)
Upstream patches are :- 22076557b07("usbip: usbip_host: fix NULL-ptr deref and use-after-free errors") c171654caa8("usbip: usbip_host: fix bad unlock balance during stub_probe()") These patches are present in 4.14, 4.4. Patches are not present in v3.18, but is present in 3.18.y; will pull them.