Bug 1819156 (CVE-2019-9456)

Summary: CVE-2019-9456 kernel: OOB write due to missing bounds check leads to local privilege escalation
Product: [Other] Security Response Reporter: msiddiqu
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: acaringi, airlied, allarkin, bhu, blc, brdeoliv, bskeggs, dhoward, dvlasenk, esammons, fhrbata, hdegoede, hkrzesin, iboverma, ichavero, itamar, jarodwilson, jeremy, jforbes, jlelli, john.j5live, jonathan, josef, jross, jshortt, jstancek, jwboyer, kernel-maint, kernel-mgr, lgoncalv, linville, masami256, mchehab, mcressma, mjg59, mlangsdo, nmurray, qzhao, rt-maint, rvrbovsk, steved, williams
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the USB monitor driver of the Linux kernel. This flaw allows an attacker with physical access to the system to crash the system or potentially escalate their privileges.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-12-15 11:15:56 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1657401, 1819158, 1825916, 1825917, 1825918    
Bug Blocks: 1750356, 1819157    

Description msiddiqu 2020-03-31 10:40:21 UTC
A vulnerability was found in USB monitor driver in Kernel where there is a possible OOB
write due to a missing bounds check. This could lead to local escalation of
privilege with System execution privileges needed. User interaction is not
needed for exploitation.


Upstream commit:

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/drivers/usb/mon/mon_text.c?id=a5f596830e27e15f7a0ecd6be55e433d776986d8

References:

https://source.android.com/security/bulletin/pixel/2019-09-01

Comment 1 msiddiqu 2020-03-31 10:47:03 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1819158]

Comment 2 Justin M. Forbes 2020-03-31 14:18:03 UTC
This was fixed for Fedora with the 4.15.11 stable kernel updates.

Comment 5 Alex 2020-04-08 12:37:32 UTC
It is by physical access attack only (with USB) and Moderate, so ooss for rhel6

Comment 10 Petr Matousek 2020-04-20 13:44:42 UTC
Mitigation:

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Comment 12 Petr Matousek 2020-04-20 14:03:18 UTC
Statement:

This issue is rated as having Low impact because of the need of physical access and debugfs mounted.