{"id":"CVE-2015-8816","details":"The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device.","modified":"2026-04-10T03:45:35.054152Z","published":"2016-04-27T17:59:03Z","related":["SUSE-SU-2016:1019-1","SUSE-SU-2016:1203-1","SUSE-SU-2016:1672-1","SUSE-SU-2016:1690-1","SUSE-SU-2016:1707-1","SUSE-SU-2016:1764-1","SUSE-SU-2016:1961-1","SUSE-SU-2016:1994-1","SUSE-SU-2016:1995-1","SUSE-SU-2016:2001-1","SUSE-SU-2016:2002-1","SUSE-SU-2016:2005-1","SUSE-SU-2016:2006-1","SUSE-SU-2016:2007-1","SUSE-SU-2016:2009-1","SUSE-SU-2016:2010-1","SUSE-SU-2016:2014-1","SUSE-SU-2016:2074-1"],"references":[{"type":"ADVISORY","url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e50293ef9775c5f1cf3fcc093037dd6a8c5684ea"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html"},{"type":"ADVISORY","url":"http://source.android.com/security/bulletin/2016-07-01.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3503"},{"type":"ADVISORY","url":"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.5"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/83363"},{"type":"ADVISORY","url":"https://github.com/torvalds/linux/commit/e50293ef9775c5f1cf3fcc093037dd6a8c5684ea"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2016/02/23/5"},{"type":"FIX","url":"https://github.com/torvalds/linux/commit/e50293ef9775c5f1cf3fcc093037dd6a8c5684ea"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1311589"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}