Bug 1404733 (CVE-2016-7915) - CVE-2016-7915 kernel: HID: core: prevent out-of-bound readings
Summary: CVE-2016-7915 kernel: HID: core: prevent out-of-bound readings
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2016-7915
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1311883 1405202
Blocks: 1395269
TreeView+ depends on / blocked
 
Reported: 2016-12-14 14:10 UTC by Vladis Dronov
Modified: 2021-02-17 02:52 UTC (History)
34 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
The hid_input_field() function in 'drivers/hid/hid-core.c' in the Linux kernel before 4.6 allows physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device.
Clone Of:
Environment:
Last Closed: 2016-12-14 14:22:37 UTC
Embargoed:


Attachments (Terms of Use)

Description Vladis Dronov 2016-12-14 14:10:01 UTC
The hid_input_field() function in 'drivers/hid/hid-core.c' in the Linux kernel before 4.6 allows physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech DJ receiver.

References:

http://source.android.com/security/bulletin/2016-11-01.html

https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-7915

Upstream patch:

https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=50220dead1650609206efe91f0cc116132d59b3f

Comment 1 Vladis Dronov 2016-12-14 14:19:57 UTC
Statement:

This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.

This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG-2 as the flaw was already fixed in the products listed.


Note You need to log in before you can comment on or make changes to this bug.