The edgebulkincallback function in drivers/usb/serial/ioti.c in the Linux kernel before 4.10.4 allows local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial device) to trigger an integer underflow.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-8924.json"
[
{
"signature_type": "Function",
"signature_version": "v1",
"source": "https://github.com/torvalds/linux/commit/654b404f2a222f918af9b0cd18ad469d0c941a8e",
"digest": {
"function_hash": "297643393498176636611690748716625839537",
"length": 1650.0
},
"id": "CVE-2017-8924-27db03fd",
"deprecated": false,
"target": {
"file": "drivers/usb/serial/io_ti.c",
"function": "edge_bulk_in_callback"
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"source": "https://github.com/torvalds/linux/commit/654b404f2a222f918af9b0cd18ad469d0c941a8e",
"digest": {
"line_hashes": [
"317518664642878700381575828402734471976",
"149826646576351872946517195851947995127",
"55235892308511459026998523128746806410",
"4993902994240944450039083102988449824"
],
"threshold": 0.9
},
"id": "CVE-2017-8924-c9cef21c",
"deprecated": false,
"target": {
"file": "drivers/usb/serial/io_ti.c"
}
}
]