7.2 High
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
6.8 Medium
CVSS3
Attack Vector
PHYSICAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8 High
AI Score
Confidence
High
0.004 Low
EPSS
Percentile
72.7%
The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device.
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e50293ef9775c5f1cf3fcc093037dd6a8c5684ea
lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html
lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
source.android.com/security/bulletin/2016-07-01.html
www.debian.org/security/2016/dsa-3503
www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.5
www.openwall.com/lists/oss-security/2016/02/23/5
www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
www.securityfocus.com/bid/83363
bugzilla.redhat.com/show_bug.cgi?id=1311589
github.com/torvalds/linux/commit/e50293ef9775c5f1cf3fcc093037dd6a8c5684ea
7.2 High
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
6.8 Medium
CVSS3
Attack Vector
PHYSICAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8 High
AI Score
Confidence
High
0.004 Low
EPSS
Percentile
72.7%