Bug 1350509 (CVE-2016-5829) - CVE-2016-5829 kernel: Heap buffer overflow in hiddev driver
Summary: CVE-2016-5829 kernel: Heap buffer overflow in hiddev driver
Status: NEW
Alias: CVE-2016-5829
Product: Security Response
Classification: Other
Component: vulnerability   
(Show other bugs)
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=moderate,public=20160625,repor...
Keywords: Security
Depends On: 1350513 1357433 1359999 1360008 1360019 1360029 1360043 1360048 1360055
Blocks: 1350516
TreeView+ depends on / blocked
 
Reported: 2016-06-27 15:45 UTC by Adam Mariš
Modified: 2019-02-08 15:01 UTC (History)
30 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A heap-based buffer overflow vulnerability was found in the Linux kernel's hiddev driver. This flaw could allow a local attacker to corrupt kernel memory, possible privilege escalation or crashing the system.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2016:2006 normal SHIPPED_LIVE Important: kernel security and bug fix update 2016-10-05 01:08:18 UTC
Red Hat Product Errata RHSA-2016:2574 normal SHIPPED_LIVE Important: kernel security, bug fix, and enhancement update 2016-11-03 12:06:10 UTC
Red Hat Product Errata RHSA-2016:2584 normal SHIPPED_LIVE Important: kernel-rt security, bug fix, and enhancement update 2016-11-03 12:08:49 UTC

Description Adam Mariš 2016-06-27 15:45:10 UTC
A vulnerabilty was found in the Linux kernels hiddev driver. An attacker with permissions to the USB HID device can call an ioctl with the HIDIOCGUSAGES or HIDIOCSUSAGES command, and passes a report id of HID_REPORT_ID_UNKNOWN range checks that would prevent oversize buffers being copied from userspace to kernel space were bypassed.

The kernel would loop on a a value passed by userspace and can copy memory outside of the intended range.  This can corrupt memory located after the struct in memory, duplicating the kernel memory or crashing the system

Upstream patch:

https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=93a2001bdfd5376c3dc2158653034c20392d15c5

Comment 1 Adam Mariš 2016-06-27 15:46:04 UTC
CVE assignment:

http://seclists.org/oss-sec/2016/q2/609

Comment 2 Adam Mariš 2016-06-27 15:46:41 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1350513]

Comment 3 Fedora Update System 2016-07-02 19:24:54 UTC
kernel-4.5.7-202.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.

Comment 4 Wade Mealing 2016-07-04 06:04:15 UTC
Statement:

This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2 and may be addressed in future updates. 

This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.

Comment 8 Fedora Update System 2016-07-20 00:23:05 UTC
kernel-4.6.4-301.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report.

Comment 13 errata-xmlrpc 2016-10-04 21:09:13 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2016:2006 https://rhn.redhat.com/errata/RHSA-2016-2006.html

Comment 14 errata-xmlrpc 2016-11-03 16:59:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2016:2574 https://rhn.redhat.com/errata/RHSA-2016-2574.html

Comment 15 errata-xmlrpc 2016-11-03 19:53:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2016:2584 https://rhn.redhat.com/errata/RHSA-2016-2584.html

Comment 16 errata-xmlrpc 2016-11-03 21:36:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2016:2574 https://rhn.redhat.com/errata/RHSA-2016-2574.html

Comment 17 errata-xmlrpc 2016-11-03 21:50:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2016:2584 https://rhn.redhat.com/errata/RHSA-2016-2584.html


Note You need to log in before you can comment on or make changes to this bug.