Bug 1283370
Summary: | CVE-2016-3136 Local RedHat Enterprise Linux DoS – RHEL 7.1 Kernel crashes on invalid USB device descriptors (mct_u232 driver) [local-DoS] | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Ralf Spenneberg <ralf> | ||||||||
Component: | kernel | Assignee: | Don Zickus <dzickus> | ||||||||
kernel sub component: | USB | QA Contact: | Mike Gahagan <mgahagan> | ||||||||
Status: | CLOSED WONTFIX | Docs Contact: | |||||||||
Severity: | high | ||||||||||
Priority: | unspecified | CC: | sergej, vdronov | ||||||||
Version: | 7.1 | Keywords: | Security, SecurityTracking | ||||||||
Target Milestone: | rc | ||||||||||
Target Release: | 7.3 | ||||||||||
Hardware: | Unspecified | ||||||||||
OS: | Unspecified | ||||||||||
Whiteboard: | |||||||||||
Fixed In Version: | Doc Type: | Release Note | |||||||||
Doc Text: | Story Points: | --- | |||||||||
Clone Of: | Environment: | ||||||||||
Last Closed: | 2016-03-17 16:53:46 UTC | Type: | Bug | ||||||||
Regression: | --- | Mount Type: | --- | ||||||||
Documentation: | --- | CRM: | |||||||||
Verified Versions: | Category: | --- | |||||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||||
Embargoed: | |||||||||||
Bug Depends On: | |||||||||||
Bug Blocks: | 1317007 | ||||||||||
Attachments: |
|
Description
Ralf Spenneberg
2015-11-18 20:12:00 UTC
Created attachment 1096272 [details]
vUSBf Payload
Created attachment 1096274 [details]
Stacktrace
Created attachment 1096275 [details]
Arduino firmware demonstrating the bug
Public via: http://seclists.org/bugtraq/2016/Mar/57 CVEID was requested at: http://seclists.org/oss-sec/2016/q1/603 CVE-2016-3136 was assigned to this flaw, please, use it in the related communications, see http://seclists.org/oss-sec/2016/q1/620. Patch was sent upstream for CVE-2016-3136, many thanks to Oliver Neukum: http://marc.info/?l=linux-usb&m=145813478817704&w=2 Thank you for reporting this flaw. The Product Security has rated this flaw as having low security impact (bz#1317007), so the patch is currently not planned to be added to the RHEL source trees. If accepted in the upstream, the patch may get to the RHEL trees later at the next USB subsystem code rebase. |