Summary: | CVE-2016-3137 Local RedHat Enterprise Linux DoS – RHEL 7.1 Kernel crashes on invalid USB device descriptors (cypress_m8 driver) [local-DoS] | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Ralf Spenneberg <ralf> | ||||||||
Component: | kernel | Assignee: | Don Zickus <dzickus> | ||||||||
kernel sub component: | USB | QA Contact: | Mike Gahagan <mgahagan> | ||||||||
Status: | CLOSED WONTFIX | Docs Contact: | |||||||||
Severity: | high | ||||||||||
Priority: | unspecified | CC: | sergej, vdronov | ||||||||
Version: | 7.1 | Keywords: | Security, SecurityTracking | ||||||||
Target Milestone: | rc | ||||||||||
Target Release: | 7.3 | ||||||||||
Hardware: | Unspecified | ||||||||||
OS: | Unspecified | ||||||||||
Whiteboard: | |||||||||||
Fixed In Version: | Doc Type: | Release Note | |||||||||
Doc Text: | Story Points: | --- | |||||||||
Clone Of: | Environment: | ||||||||||
Last Closed: | 2016-03-18 09:54:40 UTC | Type: | Bug | ||||||||
Regression: | --- | Mount Type: | --- | ||||||||
Documentation: | --- | CRM: | |||||||||
Verified Versions: | Category: | --- | |||||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||||
Bug Depends On: | |||||||||||
Bug Blocks: | 1316996 | ||||||||||
Attachments: |
|
Description
Ralf Spenneberg
2015-11-18 20:04:42 UTC
Created attachment 1096269 [details]
vUSBf Payload
Created attachment 1096270 [details]
Stacktrace
Created attachment 1096271 [details]
Arduino firmware demonstrating the bug
Public via: http://seclists.org/bugtraq/2016/Mar/55 CVEID was requested at: http://seclists.org/oss-sec/2016/q1/604 CVE-2016-3137 was assigned to this flaw, please, use it in the related communications, see http://seclists.org/oss-sec/2016/q1/621. Patch was sent upstream for CVE-2016-3137, many thanks to Oliver Neukum: http://marc.info/?l=linux-usb&m=145813816318926&w=2 Thank you for reporting this flaw. The Product Security has rated this flaw as having low security impact (bz#1316996), so the patch is currently not planned to be added to the RHEL source trees. If accepted to the upstream, the patch may get to the RHEL trees later at the next USB subsystem code rebase. |