Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <19b69f94-6f96-fc5f-5384-17ee2c399f43@redhat.com>
Date: Thu, 2 Jun 2016 13:57:57 +0200
From: Adam Maris <amaris@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE Request: bad USB host adapter implementation
 can corrupt memory/brick machine

On 02/06/16 11:10, Marcus Meissner wrote:

> Hi,
>
> reported here:
>
> https://marc.info/?l=linux-usb&m=146480770532266&w=2
>
> issue is that the Frescologic device id 1009 host controller apparently
> has a broken XHCI STREAMS implementation which would lead to memory corruptions
>
> Redhat might have already assigned a CVE.
>
> I am not sure if this is controllable for code execution, but at least USB devices can be used
> to brick a machine with the kernel running (local denial of service)?
>
> Ciao, Marcus

Red Hat hasn't assigned CVE. Overall, this has only minor security
implications. Bricking machine doesn't seem to be easily reproducible,
since on the second tested mobo it merely showed as a random memory
corruption and hard locked system. It requires specific class of
external usb devices getting plugged into machine with specific broken
xhci controller.

-- 
Adam Mariš, Red Hat Product Security
1CCD 3446 0529 81E3 86AF  2D4C 4869 76E7 BEF0 6BC2


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.