Linux kernel built with the Human Interface Device(HID) Bus support(CONFIG_HID) along with a Logitech Unifying receivers full support(CONFIG_HID_LOGITECH_DJ) driver, is vulnerable to an OOB read flaw. It could occur if a device offers a malicious HID report with arbitrary device_index. A local user with physical access to the system could use this flaw to crash the system resulting in DoS. Upstream fix: ------------- -> https://git.kernel.org/linus/ad3e14d7c5268c2e24477c6ef54bbdf88add5d36
Statement: This issue does not affect the version of the kernel package as shipped with Red Hat Enterprise Linux 5 and 6. This issue affects the versions of Linux kernel as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2 may address this issue.
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1141214]
This issue has been addressed in the following products: MRG for RHEL-6 v.2 Via RHSA-2014:1318 https://rhn.redhat.com/errata/RHSA-2014-1318.html
IssueDescription: An out-of-bounds read flaw was found in the way the Logitech Unifying receiver driver handled HID reports with an invalid device_index value. An attacker with physical access to the system could use this flaw to crash the system or, potentially, escalate their privileges on the system.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2014:1971 https://rhn.redhat.com/errata/RHSA-2014-1971.html