Bug 1283363
Summary: | CVE-2016-2185 Local RedHat Enterprise Linux DoS – RHEL 7.1 Kernel crashes on invalid USB device descriptors (ati_remote2 driver bug2) [local-DoS] | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Ralf Spenneberg <ralf> | ||||||||||
Component: | kernel | Assignee: | Don Zickus <dzickus> | ||||||||||
kernel sub component: | USB | QA Contact: | Mike Gahagan <mgahagan> | ||||||||||
Status: | CLOSED WONTFIX | Docs Contact: | |||||||||||
Severity: | high | ||||||||||||
Priority: | unspecified | CC: | sergej, vdronov | ||||||||||
Version: | 7.1 | Keywords: | Security, SecurityTracking | ||||||||||
Target Milestone: | rc | ||||||||||||
Target Release: | 7.3 | ||||||||||||
Hardware: | Unspecified | ||||||||||||
OS: | Unspecified | ||||||||||||
Whiteboard: | |||||||||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||||||||
Doc Text: | Story Points: | --- | |||||||||||
Clone Of: | Environment: | ||||||||||||
Last Closed: | 2016-03-23 16:21:07 UTC | Type: | Bug | ||||||||||
Regression: | --- | Mount Type: | --- | ||||||||||
Documentation: | --- | CRM: | |||||||||||
Verified Versions: | Category: | --- | |||||||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||||||
Embargoed: | |||||||||||||
Bug Depends On: | |||||||||||||
Bug Blocks: | 1317014 | ||||||||||||
Attachments: |
|
Description
Ralf Spenneberg
2015-11-18 19:51:24 UTC
Created attachment 1096262 [details]
vUSBf Payload
The following attachments represents the case that both interface-descriptors contain malicious values. Thus, the kernel crashes at the first nullpointer-dereference. Please let us know if you need corresponding attachments to reproduce also the second nullpointer-dereference.
#### vUSBf-Payload:
This vUSBf-Payload requires a file named ati_remote2_bug2.txt located in vUSBf/dev_desc. This file is also attached to this bug-report (* see vUSBf-Descriptorfile *).
Created attachment 1096263 [details]
Modified vUSBf descriptor file
Created attachment 1096264 [details]
Stacktrace
Created attachment 1096265 [details]
Arduino firmware demonstrating the bug
CVE-2016-2185 which is Red Hat's private CVE ID was assigned to this security flaw. Please, use it in the public communications regarding this flaw, thank you. public via: http://seclists.org/bugtraq/2016/Mar/90 patch posted upstream (linux-usb@ and linux-input@ lists): http://marc.info/?l=linux-usb&m=145874840924378&w=2 | http://article.gmane.org/gmane.linux.usb.general/139169 | http://www.spinics.net/lists/linux-usb/msg138107.html http://marc.info/?l=linux-input&m=145874841024379&w=2 | http://www.spinics.net/lists/linux-input/msg43818.html Thank you for reporting this flaw. The Product Security has rated this flaw as having low security impact (bz#1317014), so the patch is currently not planned to be added to the RHEL source trees. If accepted to the upstream, the patch may get to the RHEL trees later at the next USB subsystem code rebase. |