oss-sec mailing list archives

Re: CVE Request/Guidance: Linux kernel cdc-wdm buffer overflow triggered by device


From: Eugene Teo <eugeneteo () kernel sg>
Date: Thu, 14 Mar 2013 21:51:29 +0800

Hi Marcus,

On Thursday, 14 March 2013, Marcus Meissner wrote:

Hi,

I am wondering ... do we consider attacks with special attack taylored USB
devices as CVE worthy?

There is only some precedence in the CVE DB, but not much.

I stumbled over this fix from one of my colleagues where a specifically
made USB device reporting the "cdc-wdm" USB class could cause a kernel
heap overflow.

"Malicious attached devices" might fall into several categories:

1. Attaching the device causes the issue directly within the kernel /
autoloaded
   module, without user interaction. (here the case)


2. Attaching the device causes the issue when userspace, dependend on
   e.g. desktop system, does initiate a seperate action (like an automount
   and then exploitation of something) (so not direct a kernel, but a
   kernel + GNOME/KDE interaction).


3. User needs to do something with the attached device (like click on
   a file on a USB disk)


I would consider (1) and (2) CVE worthy at least, not so sure with (3).


I agree with (1) and (2). I have seen (3) with CVE names too. If a local,
unprivileged user can cause an issue by accessing a file or listing a set
of files in a directory due to a flaw in the underlying file system, I
think it should have a CVE name assigned.

Thanks, Eugene



Ciao, Marcus

commit c0f5ecee4e741667b2493c742b60b6218d40b3aa
Author: Oliver Neukum <oneukum () suse de <javascript:;>>
Date:   Tue Mar 12 14:52:42 2013 +0100

    USB: cdc-wdm: fix buffer overflow

    The buffer for responses must not overflow.
    If this would happen, set a flag, drop the data and return
    an error after user space has read all remaining data.

    Signed-off-by: Oliver Neukum <oliver () neukum org <javascript:;>>
    CC: stable () kernel org <javascript:;>
    Signed-off-by: Greg Kroah-Hartman <gregkh () linuxfoundation org<javascript:;>






Current thread: