On Fri, Dec 08, 2017 at 08:44:58AM -0700, Shuah Khan wrote: > Hi Jakub, > > On 12/08/2017 08:14 AM, Secunia Research wrote: > > Hi Shuah, > > > > Thanks a lot for the quick fixes. > > Thanks for finding them and doing all the leg work in > pin pointing the issues. > > > > > Please, use this email address: vuln@xxxxxxxxxxx > > > > We have assigned the following CVEs to the issues: > > CVE-2017-16911 usbip: prevent vhci_hcd driver from leaking a socket pointer > > address > > CVE-2017-16912 usbip: fix stub_rx: get_pipe() to validate endpoint number > > CVE-2017-16913 usbip: fix stub_rx: harden CMD_SUBMIT path to handle > > malicious input > > CVE-2017-16914 usbip: fix stub_send_ret_submit() vulnerability to null > > transfer_buffer > > > > Please, let me know if we should proceed with a coordinated disclosure. I'm > > not quite sure how many distros / downstreams actually use this > > functionality. > > I believe so. We have to get these into mainline and propagate them into > stables first which could take a couple of weeks. > > I will defer to Greg KH on this to comment and weigh in. I've queued them all up and will send them to Linus in a few days. As for "disclosure", well, you all are talking about this on a public mailing list, so I think there's really not much else that needs to be "disclosed" :) thanks, greg k-h -- To unsubscribe from this list: send the line "unsubscribe linux-usb" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html