Bug 169260

Summary: CVE-2005-3055 async usb devio oops
Product: Red Hat Enterprise Linux 4 Reporter: Mark J. Cox <mjc>
Component: kernelAssignee: Pete Zaitcev <zaitcev>
Status: CLOSED ERRATA QA Contact: Brian Brock <bbrock>
Severity: medium Docs Contact:
Priority: medium    
Version: 4.0CC: dhoward, jbaron
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: impact=moderate,public=20050925,source=lkml,reported=20050925
Fixed In Version: RHSA-2006-0575 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2006-08-10 21:21:33 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 181409, 185624    
Attachments:
Description Flags
Candidate #1 - Linus' patch adapted to RHEL 4 none

Description Mark J. Cox 2005-09-26 09:32:48 UTC
Harald Welte mailed the lkml on 20050925 with a report of how to cause a local
oops if a user has permissions to access an arbitrary usb device.  I've rated
this as 'moderate' instead of 'important' due to that requirement.  Although usb
permissions will be given automatically to console users, a DOS from a user who
has physical access to a machine is little extra risk and we ignore that from
the severity calculation.

See the following URL for the description and patch
http://marc.theaimsgroup.com/?l=linux-kernel&m=112766129313883

Comment 4 Pete Zaitcev 2005-10-15 04:40:40 UTC
Created attachment 120010 [details]
Candidate #1 - Linus' patch adapted to RHEL 4

Comment 5 Pete Zaitcev 2005-10-15 04:44:39 UTC
Regarding my proposal of checking if we still belong to the same process group
(or equivalent), it probably is not worth pursuing. Even if I were able to
work out kinks, it does not offer any decisive advantages over Linus' idea
of checking UID/EUID (as implemented by Harald).


Comment 8 Jason Baron 2006-04-03 17:42:14 UTC
committed in stream U4 build 34.11. A test kernel with this patch is available
from http://people.redhat.com/~jbaron/rhel4/


Comment 9 Bob Johnson 2006-04-11 17:19:45 UTC
This issue is on Red Hat Engineering's list of planned work items 
for the upcoming Red Hat Enterprise Linux 4.4 release.  Engineering 
resources have been assigned and barring unforeseen circumstances, Red 
Hat intends to include this item in the 4.4 release.

Comment 13 Red Hat Bugzilla 2006-08-10 21:21:44 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2006-0575.html