First published: Wed Dec 05 2018(Updated: )
A flaw was discovered in the Linux kernel's USB subsystem in the __usb_get_extra_descriptor() function in the drivers/usb/core/usb.c which mishandles a size check during the reading of an extra descriptor data. By using a specially crafted USB device which sends a forged extra descriptor, an unprivileged user with physical access to the system can potentially cause a privilege escalation or trigger a system crash or lock up and thus to cause a denial of service (DoS).
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1127.rt56.1093.el7 | 0:3.10.0-1127.rt56.1093.el7 |
redhat/kernel | <0:3.10.0-1127.el7 | 0:3.10.0-1127.el7 |
redhat/kernel | <0:3.10.0-693.69.1.el7 | 0:3.10.0-693.69.1.el7 |
redhat/kernel | <0:3.10.0-957.56.1.el7 | 0:3.10.0-957.56.1.el7 |
redhat/kernel | <0:3.10.0-1062.26.1.el7 | 0:3.10.0-1062.26.1.el7 |
redhat/kernel-rt | <0:4.18.0-147.rt24.93.el8 | 0:4.18.0-147.rt24.93.el8 |
redhat/kernel | <0:4.18.0-147.el8 | 0:4.18.0-147.el8 |
redhat/kernel-rt | <1:3.10.0-693.69.1.rt56.667.el6 | 1:3.10.0-693.69.1.rt56.667.el6 |
IBM Data Risk Manager | <=2.0.6 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 | |
Linux Kernel | <3.16.63 | |
Linux Kernel | >=3.17<3.18.129 | |
Linux Kernel | >=3.19<4.4.167 | |
Linux Kernel | >=4.5<4.9.145 | |
Linux Kernel | >=4.10<4.14.88 | |
Linux Kernel | >=4.15<4.19.9 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Debian GNU/Linux | =8.0 | |
Linux Kernel | <4.19.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The severity of CVE-2018-20169 is considered to be critical due to its potential impact on system integrity if exploited.
To fix CVE-2018-20169, update the Linux kernel to a version that contains the necessary patches, such as the versions provided by Red Hat or Debian.
CVE-2018-20169 affects various versions of the Linux kernel on systems such as Red Hat, Debian, and Ubuntu.
CVE-2018-20169 can be exploited by an attacker with physical access to a system, allowing them to execute arbitrary code via a specially crafted USB device.
Yes, CVE-2018-20169 has been addressed in various Linux distributions through security updates available for supported versions.