Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1531142 - (CVE-2017-17975) CVE-2017-17975 kernel: use-after-free in the usbtv_probe function in drivers/media/usb/usbtv/usbtv-core.c
CVE-2017-17975 kernel: use-after-free in the usbtv_probe function in drivers/...
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20171119,reported=2...
: Security
Depends On: 1538929
Blocks: 1538932
  Show dependency treegraph
 
Reported: 2018-01-04 11:25 EST by Laura Pardo
Modified: 2018-05-14 08:22 EDT (History)
47 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
A use-after-free fault in the Linux kernel's usbtv driver could allow an attacker to cause a denial of service (system crash), or have unspecified other impacts, by triggering failure of audio registration of USB hardware using the usbtv kernel module.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2018-02-12 06:11:23 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Laura Pardo 2018-01-04 11:25:49 EST
There is a use-after-free in the usbtv driver, on an error path of the usbtv_probe function in drivers/media/usb/usbtv/usbtv-core.c in the Linux kernel through 4.14.10. This allows an attacker to cause a denial of service (system crash) or possibly have unspecified other impact by triggering failure of audio registration, because a kfree of the usbtv data structure occurs during a usbtv_video_free call, but the usbtv_video_fail label's code attempts to both access and free this data structure.
Comment 3 Adam Mariš 2018-01-26 02:50:40 EST
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1538929]
Comment 5 Wade Mealing 2018-02-07 00:38:57 EST
Statement:

This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7, MRG-2 and real time kernels as the code which can trigger the flaw is not present in the products listed.
Comment 7 Justin M. Forbes 2018-05-04 13:05:54 EDT
This was fixed for Fedora with the 4.15.16 stable updates.

Note You need to log in before you can comment on or make changes to this bug.