An issue was discovered in yurex_read in drivers/usb/misc/yurex.c in the Linux kernel before 4.17.7. Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges.
https://github.com/torvalds/linux/commit/f1e255d60ae66a9f672ff9a207ee6cd8e33d2679
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.17.7
https://www.debian.org/security/2018/dsa-4308
https://usn.ubuntu.com/3776-2/
https://usn.ubuntu.com/3776-1/
https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
https://bugzilla.suse.com/show_bug.cgi?id=1115593
https://bugzilla.suse.com/show_bug.cgi?id=1106095
https://usn.ubuntu.com/3849-2/
https://usn.ubuntu.com/3847-3/
https://usn.ubuntu.com/3847-2/
Source: MITRE
Published: 2018-08-31
Updated: 2023-02-24
Type: CWE-787
Base Score: 7.2
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact Score: 10
Exploitability Score: 3.9
Severity: HIGH
Base Score: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 1.8
Severity: HIGH