Bug 1655816 (CVE-2018-19824)

Summary: CVE-2018-19824 kernel: Use-after-free in sound/usb/card.c:usb_audio_probe()
Product: [Other] Security Response Reporter: Sam Fowler <sfowler>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: abhgupta, acaringi, airlied, bhu, blc, brdeoliv, bskeggs, dbaker, dhoward, dvlasenk, ewk, fhrbata, hdegoede, hkrzesin, hwkernel-mgr, iboverma, ichavero, itamar, jarodwilson, jforbes, jglisse, jkacur, john.j5live, jokerman, jonathan, josef, jross, jstancek, jwboyer, kernel-maint, kernel-mgr, labbott, lgoncalv, linville, matt, mchehab, mcressma, mjg59, mlangsdo, nmurray, plougher, rt-maint, rvrbovsk, slawomir, steved, sthangav, trankin, williams, wmealing
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found In the Linux kernel, through version 4.19.6, where a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c. An attacker could corrupt memory and possibly escalate privileges if the attacker is able to have physical access to the system.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-09-12 12:45:32 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1655817, 1658920, 1658921, 1658922, 1658923, 1658924, 1658925, 1658926, 1726371    
Bug Blocks: 1655818    

Description Sam Fowler 2018-12-04 02:01:33 UTC
In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.

An attacker with physical access with a specially crafted USB device in tandem with the ability to run software on the machine may be able to create a situation where an exploit can allow for privilege escalation.

While Red Hat finds this scenario unlikely, this is the most likely case of how an attacker can use this flaw.



External Reference:

https://www.openwall.com/lists/oss-security/2018/12/03/1


Reference:

https://bugzilla.suse.com/show_bug.cgi?id=1118152


Upstream Patches:

https://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git/commit/?id=5f8cf712582617d523120df67d392059eaf2fc4b
https://github.com/torvalds/linux/commit/5f8cf712582617d523120df67d392059eaf2fc4b

Comment 1 Sam Fowler 2018-12-04 02:02:32 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1655817]

Comment 6 errata-xmlrpc 2019-09-10 19:00:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2019:2703 https://access.redhat.com/errata/RHSA-2019:2703

Comment 7 Product Security DevOps Team 2019-09-12 12:45:32 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2018-19824