drivers/hid/hid-pl.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_PANTHERLORD is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2013-2892 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue does not affect the version of the kernel package as shipped with Red Hat Enterprise Linux 5.
This issue affects the versions of Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2 may address this issue.
Note: user would need physical access to the system to exploit this issue.
Base Score | 6.2 |
---|---|
Base Metrics | AV:L/AC:H/Au:N/C:C/I:C/A:C |
Access Vector | Local |
Access Complexity | High |
Authentication | None |
Confidentiality Impact | Complete |
Integrity Impact | Complete |
Availability Impact | Complete |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 6 (kernel) | RHSA-2013:1645 | 2013-11-20 |
Red Hat MRG Grid for RHEL 6 Server v.2 (kernel-rt) | RHSA-2013:1490 | 2013-10-31 |
RHEV Hypervisor for RHEL-6 (rhev-hypervisor6) | RHSA-2013:1527 | 2013-11-21 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 7 | kernel | Not affected |
Red Hat Enterprise Linux 5 | kernel | Not affected |