Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 2 Feb 2018 13:40:32 +0100
From: "Secunia Research" <vuln@...unia.com>
To: <oss-security@...ts.openwall.com>
Cc: <vuln@...unia.com>
Subject: Secunia Research: Linux Kernel USB over IP Information Disclosure Vulnerability

======================================================================

 
                     Secunia Research 2017/12/11
 
    Linux Kernel USB over IP Information Disclosure Vulnerability
 
======================================================================

Table of Contents
 
Affected Software....................................................1
Severity.............................................................2
Description of Vulnerability.........................................3
Solution.............................................................4
Time Table...........................................................5
Credits..............................................................6
References...........................................................7
About Flexera .......................................................8
Verification.........................................................9
 
======================================================================

1) Affected Software
 
Linux Kernel versions 4.4.x prior to 4.4.114, 4.9.x prior to 4.9.79, and
4.14.x prior to 4.14.8.
 
======================================================================

2) Severity
 
Rating: Not critical
Impact: Information Disclosure
Where:  Local System
 
======================================================================

3) Description of Vulnerability
 
Secunia Research has discovered a vulnerability in Linux Kernel, which can
be exploited by malicious, local users to disclose potentially sensitive
information.
 
An error in the vhci_hcd driver can be exploited to disclose otherwise
restricted kernel memory address.
 
Successful exploitation of this vulnerability requires a USB device attached
over IP.
 
The vulnerability is confirmed in version 4.14.0-rc1 and reported in
versions 4.4.x prior to 4.4.114, 4.9.x prior to 4.9.79, and 4.14.x prior to
4.14.8. Other versions may also be affected.
 
======================================================================

4) Solution
 
Update to version 4.4.114, 4.9.79, or 4.14.8.
https://git.kernel.org/linus/2f2d0088eb93db5c649d2a5e34a3800a8a935fc5
 
======================================================================

5) Time Table
 
2017/11/29 - Linux Kernel team contacted with vulnerability details.
2017/11/29 - Linux Kernel team confirmed the vulnerability.
2017/12/07 - Public disclosure of the vulnerability.
2017/12/11 - Release of Secunia Advisory SA77000.
2017/12/11 - Public disclosure of Secunia Research Advisory.
2017/12/21 - Moved this vulnerability from Secunia Advisory SA77000
             to SA80454. Updated Secunia Research Advisory
             due to a GIT commit having been applied and certain
             fixed versions having been released.
2017/12/27 - Updated due to an update of Secunia Advisory SA80454.
2018/02/01 - Updated due to an update of Secunia Advisory SA80454.
 
======================================================================

6) Credits
 
Jakub Jirasek, Secunia Research at Flexera.
 
======================================================================

7) References
 
The Flexera CNA has assigned the CVE-2017-16911 identifier for the
vulnerability through the Common Vulnerabilities and Exposures (CVE)
project.
 
======================================================================

8) About Flexera
 
Flexera helps application producers and enterprises increase application
usage and the value they derive from their software.
 
http://www.flexera.com
 
Flexera delivers market-leading Software Vulnerability Management solutions
enabling enterprises to proactively identify and remediate software
vulnerabilities, effectively reducing the risk of costly security breaches.
 
https://www.flexera.com/enterprise/products/
 
Flexera supports and contributes to the community in several ways. We have
always believed that reliable vulnerability intelligence and tools to aid
identifying and fixing vulnerabilities should be freely available for
consumers to ensure that users, who care about their online privacy and
security, can stay secure.
Only a few vendors address vulnerabilities in a proper way and help users
get updated and stay secure. End-users (whether private individuals or
businesses) are otherwise left largely alone, and that is why back in 2002,
Secunia Research started investigating, coordinating disclosure and
verifying software vulnerabilities.
In 2016, Secunia Research became a part of Flexera and today our in-house
software vulnerability research remains the core of the Software
Vulnerability Management products at Flexera.
 
https://www.flexera.com/enterprise/company/about/secunia-research/
 
The public Secunia Advisory database contains information for researchers,
security enthusiasts, and consumers to lookup individual products and
vulnerabilities and assess, whether they need to take any actions to secure
their systems or whether a given vulnerability has already been discovered
 
https://secuniaresearch.flexerasoftware.com/community/advisories/
 
======================================================================

9) Verification
 
Please verify this advisory by visiting the Secunia Research website:
https://secuniaresearch.flexerasoftware.com/secunia_research/2017-20
 
======================================================================



Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.