Bug 1539725 (CVE-2017-18079)

Summary: CVE-2017-18079 kernel: Null pointer dereference in drivers/input/serio/i8042.c leading to denial-of-service
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: airlied, ajax, aquini, bhu, blc, bskeggs, dhoward, esammons, ewk, fhrbata, hdegoede, hkrzesin, hwkernel-mgr, iboverma, ichavero, itamar, jarodwilson, jforbes, jglisse, jkacur, john.j5live, jonathan, josef, jross, jwboyer, kernel-maint, kernel-mgr, labbott, lgoncalv, linville, lwang, matt, mchehab, mcressma, mguzik, mjg59, mlangsdo, nmurray, plougher, rt-maint, rvrbovsk, skozina, steved, vdronov, williams, wmealing
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: kernel 4.13 Doc Type: Bug Fix
Doc Text:
A flaw was found in the Linux kernel's implementation of i8042 serial ports. An attacker could cause a kernel panic if they are able to add and remove devices as the module is loaded.
Story Points: ---
Clone Of: Environment:
Last Closed: 2018-02-12 10:26:54 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1539728    

Description Adam Mariš 2018-01-29 14:06:23 UTC
A flaw was found in the Linux kernel which allowed an attacker who is able to add or remove serial devices to exploit a race condition in the serial port handling.  This would cause the system to panic or possibly have unspecified other impact because the port->exists value can change after it is validated.

Upstream patch:

https://github.com/torvalds/linux/commit/340d394a789518018f834ff70f7534fc463d3226

Comment 4 Vladis Dronov 2018-02-12 10:26:54 UTC
Statement:

This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7, its real-time kernel and Red Hat Enterprise MRG 2. At this time there are no plans to fix this issue.

This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE.