Bug 1283362
Summary: | CVE-2016-2185 Local RedHat Enterprise Linux DoS – RHEL 7.1 Kernel crashes on invalid USB device descriptors (ati_remote2 driver bug1) [local-DoS] | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Ralf Spenneberg <ralf> | ||||||||||
Component: | kernel | Assignee: | Don Zickus <dzickus> | ||||||||||
kernel sub component: | USB | QA Contact: | Mike Gahagan <mgahagan> | ||||||||||
Status: | CLOSED WONTFIX | Docs Contact: | |||||||||||
Severity: | high | ||||||||||||
Priority: | unspecified | CC: | sergej, vdronov | ||||||||||
Version: | 7.1 | Keywords: | Security, SecurityTracking | ||||||||||
Target Milestone: | rc | ||||||||||||
Target Release: | 7.3 | ||||||||||||
Hardware: | Unspecified | ||||||||||||
OS: | Unspecified | ||||||||||||
Whiteboard: | |||||||||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||||||||
Doc Text: | Story Points: | --- | |||||||||||
Clone Of: | Environment: | ||||||||||||
Last Closed: | 2016-03-23 16:21:20 UTC | Type: | Bug | ||||||||||
Regression: | --- | Mount Type: | --- | ||||||||||
Documentation: | --- | CRM: | |||||||||||
Verified Versions: | Category: | --- | |||||||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||||||
Embargoed: | |||||||||||||
Bug Depends On: | |||||||||||||
Bug Blocks: | 1317014 | ||||||||||||
Attachments: |
|
Description
Ralf Spenneberg
2015-11-18 19:45:35 UTC
Created attachment 1096258 [details]
vUSBf Payload
This vUSBf-Payload requires a file named ati_remote2_bug1.txt located in vUSBf/dev_desc. This file is also attached to this bug-report (* see vUSBf-Descriptorfile *).
Created attachment 1096259 [details]
Modified vUSBf descriptor file
Created attachment 1096260 [details]
Stacktrace
Created attachment 1096261 [details]
Arduino firmware demonstrating the bug
CVE-2016-2185 which is Red Hat's private CVE ID was assigned to this security flaw. Please, use it in the public communications regarding this flaw, thank you. public via: http://seclists.org/bugtraq/2016/Mar/90 patch posted upstream (linux-usb@ and linux-input@ lists): http://marc.info/?l=linux-usb&m=145874840924378&w=2 | http://article.gmane.org/gmane.linux.usb.general/139169 | http://www.spinics.net/lists/linux-usb/msg138107.html http://marc.info/?l=linux-input&m=145874841024379&w=2 | http://www.spinics.net/lists/linux-input/msg43818.html Thank you for reporting this flaw. The Product Security has rated this flaw as having low security impact (bz#1317014), so the patch is currently not planned to be added to the RHEL source trees. If accepted to the upstream, the patch may get to the RHEL trees later at the next USB subsystem code rebase. |