Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2981059imu; Sun, 13 Jan 2019 15:11:11 -0800 (PST) X-Google-Smtp-Source: ALg8bN5LMHL8VH7gxGAqwd0Crw3nLnNnFGrPloGZRgnSd1gZw49wWlqnEkG4jFK+E38cjzI1XK5e X-Received: by 2002:a63:f94c:: with SMTP id q12mr20586639pgk.91.1547421070938; Sun, 13 Jan 2019 15:11:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547421070; cv=none; d=google.com; s=arc-20160816; b=pU7wdNYE69kMXvC7qFOuqQ9CdtKnwHVoLx+RaD0zC6yIi1wvPmYRPCiqS400c5z41N mrP3xF6D0azUCVJT/Fp23q5IFm7FDZpxKQPD4lohioB1R/6VNJPFdkw8TCU78PDeDxDY kCcCFet3PSEeotbTaPEqxAzt6yXUTjHOHa4Qpl4oEP6R1pbWJxgr6jzHY5x2NtJskh8I 8oD1d9d3TVfd0K9ZD0at3PnRs59MjSHidZN/K6oNcmdm+gskJR+SsX90yur9klOcaNjs y9T05E7rV02+IX5qOhg2n0ZqZPnqrJ8umYJUxNXCbDYNipHHYkikAJ5wT1Wzy27R3oiq oLsA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=Q4wzvdzoJbXXhlrVhsCHl0UnOknm+ZQ5feTCG8Idzmk=; b=IhVgf2n8WW2sprhy1QoZhl6bHMlGRYBlqgEVrbnh5YazU+KnHP1bd3ygxU1sTdzm3i zMn+QNcpolYnW7kyLULvdMFcCWWDP3DwvH4Ea8d3zWfMifLeE/Tdf4tOQtAMCEuCFsw+ y63gHY7q51cMmxOufNobLa9p5Otphxf6XyH3vPUcHHVIRtOOxCmHoGxqY4A003P65sWM cfCJjOKAtsQbLy2dy6wV8/YnUlvn5wwiL//FNXGpFc1QNeE08GFx0eGpwXlHbL9Ptrzr iiVS9DFCokJnWxgCtT7O9EJMJAABb2rAK6vrEEKYwMIdPPDanLxeU6PsXqGF2hTrGQu4 n0GA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o22si25686845pgb.584.2019.01.13.15.10.54; Sun, 13 Jan 2019 15:11:10 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726621AbfAMXJu (ORCPT + 99 others); Sun, 13 Jan 2019 18:09:50 -0500 Received: from atrey.karlin.mff.cuni.cz ([195.113.26.193]:46949 "EHLO atrey.karlin.mff.cuni.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726471AbfAMXJu (ORCPT ); Sun, 13 Jan 2019 18:09:50 -0500 Received: by atrey.karlin.mff.cuni.cz (Postfix, from userid 512) id 22179809C5; Mon, 14 Jan 2019 00:09:41 +0100 (CET) Date: Mon, 14 Jan 2019 00:09:46 +0100 From: Pavel Machek To: Benjamin Tissoires Cc: Anatoly Trosinenko , Jiri Kosina , lkml , "open list:HID CORE LAYER" , Roderick Colenbrander Subject: Re: NULL pointer dereference when writing fuzzed data to /dev/uhid Message-ID: <20190113230946.GA18710@amd> References: MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="5vNYLRcllDrimb99" Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --5vNYLRcllDrimb99 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi! I just want to note that while these may not be high-priority, they are still security holes to be fixed. > > When writing the attached file to /dev/uhid, a NULL dereference occurs > > in kernel. As I understand, the problem is not UHID-specific, but is > > related to HID subsystem. >=20 > Thanks for the report. > I wanted to tell you that I started investigating the other private > report you sent us, but couldn't find the time to properly come with a > fix as the fuzzed data is hard to discriminate from valid data. >=20 > A couple of notes though: > - writing to uhid needs to be done by root. Any distribution that > doesn't enforce that is doomed to have several security issues We want to protect kernel from root, too. > - we could somehow reproduce those fuzzed data on a USB or Bluetooth > connection, but that would require physical access to the device, so > you are doomed also Not neccessarily. Imagine a kiosk where PC is protected but keyboard uses USB connection. If our USB stack is buggy, you are doomed... but you should not be ;-). Pavel --=20 (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blo= g.html --5vNYLRcllDrimb99 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iEYEARECAAYFAlw7xToACgkQMOfwapXb+vJlLACgm4d3vDsB9nJwfr2hXsDb7+K+ yqUAoJgqQ2VnCZ52zQ9eptL+D5k5BLSb =zVPf -----END PGP SIGNATURE----- --5vNYLRcllDrimb99--