Bug 1819156 (CVE-2019-9456) - CVE-2019-9456 kernel: OOB write due to missing bounds check leads to local privilege escalation
Summary: CVE-2019-9456 kernel: OOB write due to missing bounds check leads to local pr...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2019-9456
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1657401 1819158 1825916 1825917 1825918
Blocks: 1750356 1819157
TreeView+ depends on / blocked
 
Reported: 2020-03-31 10:40 UTC by msiddiqu
Modified: 2021-12-15 11:15 UTC (History)
42 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the USB monitor driver of the Linux kernel. This flaw allows an attacker with physical access to the system to crash the system or potentially escalate their privileges.
Clone Of:
Environment:
Last Closed: 2021-12-15 11:15:56 UTC
Embargoed:


Attachments (Terms of Use)

Description msiddiqu 2020-03-31 10:40:21 UTC
A vulnerability was found in USB monitor driver in Kernel where there is a possible OOB
write due to a missing bounds check. This could lead to local escalation of
privilege with System execution privileges needed. User interaction is not
needed for exploitation.


Upstream commit:

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/drivers/usb/mon/mon_text.c?id=a5f596830e27e15f7a0ecd6be55e433d776986d8

References:

https://source.android.com/security/bulletin/pixel/2019-09-01

Comment 1 msiddiqu 2020-03-31 10:47:03 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1819158]

Comment 2 Justin M. Forbes 2020-03-31 14:18:03 UTC
This was fixed for Fedora with the 4.15.11 stable kernel updates.

Comment 5 Alex 2020-04-08 12:37:32 UTC
It is by physical access attack only (with USB) and Moderate, so ooss for rhel6

Comment 10 Petr Matousek 2020-04-20 13:44:42 UTC
Mitigation:

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Comment 12 Petr Matousek 2020-04-20 14:03:18 UTC
Statement:

This issue is rated as having Low impact because of the need of physical access and debugfs mounted.


Note You need to log in before you can comment on or make changes to this bug.