Description
Multiple buffer overflows in the command_port_read_callback function in drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in the Linux kernel before 3.16.2 allow physically proximate attackers to execute arbitrary code or cause a denial of service (memory corruption and system crash) via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with a bulk response.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-118-1 | linux-2.6 security update |
Ubuntu USN |
USN-2374-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2375-1 | Linux kernel (EC2) vulnerabilities |
Ubuntu USN |
USN-2376-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2377-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-2378-1 | Linux kernel (Trusty HWE) vulnerabilities |
Ubuntu USN |
USN-2379-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: Chrome
Published:
Updated: 2024-08-06T10:35:56.990Z
Reserved: 2014-05-03T00:00:00.000Z
Link: CVE-2014-3185
No data.
Status : Modified
Published: 2014-09-28T10:55:10.283
Modified: 2026-05-06T22:30:45.220
Link: CVE-2014-3185
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Ubuntu USN