fkie_cve-2017-7273
Vulnerability from fkie_nvd
Published
2017-03-27 17:59
Modified
2025-04-20 01:37
Severity ?
Summary
The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 3.2 and 4.x before 4.9.4 allows physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7572A0F-20BA-4206-A3DC-87FF1E0A8999", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1303D35A-7D3E-476F-95EC-514BC12A8EF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "2F2331B3-45AF-4406-9641-A78F949C85D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "F2FAD591-2AE8-4A14-91D8-79946C9D2244", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "D5411C41-0F80-4633-9778-6BA7A20EED0E", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "17A43AA1-FF07-46AA-8A22-B73639876929", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3F7AB076-B553-4E1D-A604-4DFD976FC155", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "BF9F02C5-128B-4E30-BA0E-7FD771F8AA72", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "A449E564-051A-4C33-888D-DD84D15C1C01", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "D7321A21-F4FC-4C05-8362-47BA25933FA6", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "59A93BBA-576F-46AC-B09C-BA7CDC6C71C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4BBA308E-F27E-4915-B7DF-C6DCE56ABA1C", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "5398D9C4-9161-4C8E-AE72-A449A8546C47", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "42D448D6-CCC0-4FF1-B2EA-7A99C3A467B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "AE654C62-FB2D-4F0C-858E-DBF15637A5EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "EA5C6932-4C99-4271-BBE4-710B7C6984F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "809E15BD-4613-4D53-91DE-EE115A7A6D48", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "F5FBC32B-82C6-4DE2-9E94-3E1765B7234D", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "AB50C500-289B-43CA-9AF5-69564A452213", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "C51F0A1C-1359-4C88-820C-3A721F64A1E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "E893E542-F408-42C4-B3BE-F5D45A0CAA6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "64112FF2-CADE-4A2B-8510-CC169A0CC640", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "F1DEF239-FE85-4B68-B42C-A2AA35BAF2C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01EB3380-3648-4595-BA99-49D35518004F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5CA80751-D14B-43F7-B646-10C99BBEF8A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2CF9E0E4-22DE-4464-9601-42EC87308DE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "FF3DC15B-8605-410E-A88F-28AB935062DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "6CCD9FDB-40B5-4CDB-BCF4-C6EB76DDC286", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "A5B5BA6D-3170-4EC1-BDF7-B285954FC289", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "AE8F1C59-37C8-46E7-B314-9A56B38DC626", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "809B3718-F18A-4396-825A-3BCA8BB6D4F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "C96A4F6D-4245-4638-AFE3-1A6B70D7659A", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "DBC8D404-DC9D-423D-85F7-848A16EE2A2A", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "A6F8E8DA-CB24-4F0A-ACA9-52A79E512F35", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "DB0A8C29-A79E-4418-AD91-D2730F5CBBFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "C65BF8B8-071F-42CB-B710-8E6FFC49B1A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "E5C5B538-158C-4F4A-9452-DAD2D0EF5A7E", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "AC507686-B52C-4ABE-9734-147071FC7C08", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "3A8954F8-18FC-48DE-8E8E-C68D09EC81BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "5E6FEC0B-2D57-4690-90F5-0F4D581B65A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "FC59579D-99D7-4A60-AD3F-1ACC89579A37", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "362FD028-8C86-45FD-8051-2F7964B78372", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.3:rc7:*:*:*:*:*:*", "matchCriteriaId": "A729D0E4-EEA8-4497-B6B7-D9C83C4E9F97", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEA9A668-E934-4FB3-9D88-6CA14147AD11", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "3AEAC7CF-3964-48B8-8B46-05CE5255E15F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F026B34-4748-4550-BB80-F66DEA7A68BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "E4AC7892-7F57-4A7A-9AA5-FE7C100A91E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "2F595A1E-2CDD-4665-895E-7CE0B2E639B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "0F81F522-54E6-4EBA-B6C1-EB0E5DAA28A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.4:rc8:*:*:*:*:*:*", "matchCriteriaId": "AD811782-D76C-4CC9-9F00-BFE7E258362F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "C10C7BD3-0FB9-4386-B06A-75CD2E36F6AC", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "7573E7DF-E5D8-4E7F-807D-0B6B50118FE7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "E86C90E9-FB1C-4466-AD61-D27F0E4CA411", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "33A20133-AACA-46C5-AE38-A3A887A9C788", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "47A5B50B-F65A-43B9-B8BE-C6CB65644F33", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "9113E6CE-7775-43B4-8DBA-2C2ECD9DB350", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "BEB8991C-48C3-4E5D-BFB0-507CBFBFCFBC", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "8627D965-B873-4DD2-B7ED-9E620CB13ABB", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "F27839ED-79D7-4E33-B1A0-F6A5E2CFD4CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "975D6639-AB42-403F-A366-9A4C44DFC149", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.4.22:*:*:*:*:*:*:*", "matchCriteriaId": "69FD6F60-3836-4F63-826D-FC3CBAE3D338", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.4.23:*:*:*:*:*:*:*", "matchCriteriaId": "04EB1200-5662-4AB8-913F-7517471BA12F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.4.24:*:*:*:*:*:*:*", "matchCriteriaId": "96CBD63C-722B-4D8E-BD73-9DB23831B291", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.4.25:*:*:*:*:*:*:*", "matchCriteriaId": "6959AD65-8A87-4B9F-A829-1ED0294FE222", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.4.26:*:*:*:*:*:*:*", "matchCriteriaId": "273AF0D4-6C6A-4068-8C40-A4D1F0B30824", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.4.27:*:*:*:*:*:*:*", "matchCriteriaId": "C8019864-3F8D-461A-A34A-EA0EDA13A763", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.4.28:*:*:*:*:*:*:*", "matchCriteriaId": "7F69BAE1-5306-4A37-B97A-C0AF1E7E84B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.4.32:*:*:*:*:*:*:*", "matchCriteriaId": "B4CBBC02-0AA7-4032-A16B-D17CFA8FEFE3", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9AD48C5-8D13-49BA-8202-06E6F9AB2E1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.5.0:rc7:*:*:*:*:*:*", "matchCriteriaId": "74D8F1E1-5953-48EB-A3FB-218ACA871E9A", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "6C109D0C-7124-4BBE-B7BB-AEDDF00E60BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "F43363AA-209F-4BFB-AFCE-80F9CB9ACDAE", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CA4862B1-B581-4D52-8176-795B1628362C", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "76D54C1A-4DD3-47D3-A024-D920595C9F4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "4139A8FF-4700-4C25-A527-9584A8B9B242", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "9DCA4A2B-412C-4A22-B784-68BDCBBBE32D", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.6:*:*:*:*:*:*:*", "matchCriteriaId": "273E9BE2-7913-4FA4-9E2E-41AF562FA7B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E28FBEF-2115-430E-A33D-7277B83344D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "5E4E158A-A7D7-4FF2-9875-C7098FA6BA29", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "873D44F2-E5A5-4C6E-9003-EECF0C42D1CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "D55DB3B5-7C4F-4FE7-AB0C-BEA59EEE066C", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB53773F-E2E1-47BE-B692-E593495B9B4F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "DBA48FB4-C629-41CC-9314-D38CD2C225B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.7:*:*:*:*:*:*:*", "matchCriteriaId": "D50FE96C-7A38-486B-8B90-D3D29813A990", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.7:rc6:*:*:*:*:*:*", "matchCriteriaId": "B3E4C538-05B3-47AA-8464-087549C0D8F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "B52A2B03-3177-41EE-8917-04575975845B", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "C83B1C49-7EBF-4535-872D-F5F11ECFCC73", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.8:*:*:*:*:*:*:*", "matchCriteriaId": "4E12A4EF-B3CF-432B-B9FF-AEF80A5C6906", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "B3BA4997-9F14-4977-A041-6C6CFF014E3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "4162F4BA-D4CB-4F33-8335-F491F33C2F99", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "77FB75CA-DAFB-48DC-8A4E-0EBB06A29F55", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "EE207AE1-85FE-4310-A9C4-439EE8B57A6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "A9BCB720-B61A-4E58-8066-95BC70C9BE1A", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "30E48B85-81BC-4C54-B18A-01879ABCBE8B", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "FA81E6E4-69A4-4C71-874D-F5E4B90137FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "060B2881-DF55-489D-92C9-B4383552DC06", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "3CC6EDF6-7BB3-4E8C-A248-73980DAA5ED5", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.8.10:*:*:*:*:*:*:*", "matchCriteriaId": "173525CD-4915-4B9E-BD81-7C0115F96D14", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "A8A7730B-9C1F-41A6-B357-35057F5B9C78", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.8.12:*:*:*:*:*:*:*", "matchCriteriaId": "E1B65550-0D14-4A25-A29E-151746526845", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.8.14:*:*:*:*:*:*:*", "matchCriteriaId": "8ED87791-5FE9-4955-B4BA-F744C7B6085B", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.8.16:*:*:*:*:*:*:*", "matchCriteriaId": "E1B21E8A-2312-4CBB-BE53-8EE660A56678", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.8.17:*:*:*:*:*:*:*", "matchCriteriaId": "E98CD5F7-9730-4B07-A43D-A7D4C54CCF60", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "686DF390-3DCA-4D64-9858-FF699FA21D9A", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "D24EF446-2120-4F2F-9D84-F782BF1D85CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DA879AFB-E995-458B-ABD2-87477376A70D", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.10:*:*:*:*:*:*:*", "matchCriteriaId": "1DCB26E2-5F19-4F9C-9FF3-184EF7262D6D", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "3B614F17-FC57-4689-B875-33C2915432CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "4F8E178C-5E11-4335-94B5-8FBBF1EA0634", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "6B0C1F4E-9C54-4FC2-AD07-0D3B26CC2B6F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 3.2 and 4.x before 4.9.4 allows physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report." }, { "lang": "es", "value": "La funci\u00f3n cp_report_fixup en drivers/hid/hid-cypress.c en el kernel de Linux 3.2 y 4.x en versiones anteriores a 4.9.4 permite a atacantes f\u00edsicamente pr\u00f3ximos provocar una denegaci\u00f3n de servicio (desbordamiento inferior de entero) o posiblemente tener otro impacto no especificado a trav\u00e9s de un reporte HID manipulado" } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/191.html\"\u003eCWE-191: Integer Underflow (Wrap or Wraparound)\u003c/a\u003e", "id": "CVE-2017-7273", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 0.7, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-27T17:59:01.007", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1ebb71143758f45dc0fa76e2f48429e13b16d110" }, { "source": "cve@mitre.org", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4faec4a2ef5dd481682cc155cb9ea14ba2534b76" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.4" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97190" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/1ebb71143758f45dc0fa76e2f48429e13b16d110" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1ebb71143758f45dc0fa76e2f48429e13b16d110" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4faec4a2ef5dd481682cc155cb9ea14ba2534b76" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/1ebb71143758f45dc0fa76e2f48429e13b16d110" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…