Bug 1316993 (CVE-2016-3139)

Summary: CVE-2016-3139 kernel: Crash on invalid USB device descriptors (wacom driver)
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: agordeev, anemec, aquini, arm-mgr, bhu, dhoward, esammons, fhrbata, gansalmon, iboverma, itamar, jforbes, jkacur, joelsmith, jonathan, jross, jwboyer, kernel-maint, kernel-mgr, kstutsma, lgoncalv, lwang, madhu.chinakonda, matt, mchehab, mcressma, mguzik, nmurray, pholasek, plougher, rt-maint, rvrbovsk, vdronov, williams
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-03-15 10:56:13 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1283375, 1283377, 1317010    
Bug Blocks: 1317020    

Description Adam Mariš 2016-03-11 16:21:58 UTC
Kernel crash occurs when presented a buggy USB device which requires wacom driver, causing null pointer dereference.

Product bugs:

https://bugzilla.redhat.com/show_bug.cgi?id=1283375
https://bugzilla.redhat.com/show_bug.cgi?id=1283377

Comment 2 Adam Mariš 2016-03-11 17:04:39 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1317010]

Comment 3 Adam Mariš 2016-03-14 10:00:57 UTC
Public via:

http://seclists.org/bugtraq/2016/Mar/60

CVE request and assignment:

http://seclists.org/oss-sec/2016/q1/606

http://seclists.org/oss-sec/2016/q1/623

Upstream commit: the upstream driver was rebased and does not have this bug, so this bug is rhel7-only and there is no upstream commit.

Comment 4 Vladis Dronov 2016-03-15 10:48:18 UTC
Acknowledgements:

Name: Ralf Spenneberg (OpenSource Security)

Comment 5 Vladis Dronov 2016-03-15 10:51:51 UTC
Statement:

This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG-2. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.