Announcement

Collapse
No announcement yet.

More Than One Dozen USB Vulnerabilities Published For The Linux Kernel

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • More Than One Dozen USB Vulnerabilities Published For The Linux Kernel

    Phoronix: More Than One Dozen USB Vulnerabilities Published For The Linux Kernel

    Made public on Monday were details on 14 known security vulnerabilities within the Linux kernel's USB subsystem while there is also known to be more similar bugs that are yet to be resolved...

    Phoronix, Linux Hardware Reviews, Linux hardware benchmarks, Linux server benchmarks, Linux benchmarking, Desktop Linux, Linux performance, Open Source graphics, Linux How To, Ubuntu benchmarks, Ubuntu hardware, Phoronix Test Suite

  • #2
    Typo?

    "and to have physical address to the vulnerable Linux system" instead of "and to have physical access to the vulnerable Linux system"?

    Comment


    • #3
      inb4 "they must rewrite it in rust".

      That said, for "malicious USB device" it's probably good any programmable system with usb guest ports, so any rootable Android phone, a large list of SBCs and network embedded devices with a single port, and various microcontrollers like some Atmegas whose name I keep forgetting

      Comment


      • #4
        In before "The should rewrite the kernel in rust."

        Comment


        • #5
          Thanks to the person or people who have found out about these vulnerabilities! Every security hole that is found or denied is a huge step forward.

          Comment


          • #6
            Heh, I can see a Corsair Voyager on that photo. Mine is a 1GB model and the first flashdrive I ever owned. And the damn thing still works more than 10 years later!

            Comment


            • #7
              If I follow the link I see all of these "more than a dozen (14) usb vulnerabilities" the article talks about are fixed. So no news to report here? Anyway, if I follow the link at the link to https://github.com/google/syzkaller/...nd_bugs_usb.md I see around 35 unfixed vulnerabilities - Why not make a news article from that?

              //EDIT: Or change the title to "14 USB vulnerabilites fixed - 35 still open" ? Would be a more interresting article to read.
              Last edited by V10lator; 07 November 2017, 03:51 PM.

              Comment


              • #8
                Originally posted by V10lator View Post
                If I follow the link I see all of these "more than a dozen (14) usb vulnerabilities" the article talks about are fixed. So no news to report here? Anyway, if I follow the link at the link to https://github.com/google/syzkaller/...nd_bugs_usb.md I see around 35 unfixed vulnerabilities - Why not make a news article from that?

                //EDIT: Or change the title to "14 USB vulnerabilites fixed - 35 still open" ? Would be a more interresting article to read.
                Double check what you linked to. There were 14 true exploitable vulnerabilities. The other 35 are driver dies due to current day inbuilt protections. Yes so a lot more issues to fix none of them look like security vulnerabilities.

                Comment


                • #9
                  Well, among the non-exploit basic features of the USB-bus is to take control of the computer as if you were a local user connected by USB keyboard and mouse.

                  Comment


                  • #10
                    Unless there are good solutions to these problems without causing performance or compatibility issues, I'm not sure I really care about any of this. These vulnerabilities just cause DoS and system crashes. Seeing as you have to have a specially-made device and physical access to the PC, there's a much easier way to inconvenience someone:
                    The USBKill has evolved. The new V4 hardware framework enables advanced functionality and performance. Depending on your needs, the USBKill V4 comes in three versions: Basic, Pro and Classic. Included with every USBKill V4: Purchase Protection: Money Back Guarantee World-wide shipping: Tracked & Express Options Mos

                    If you want to be cheap or maybe not cause permanent damage, you could just take any plain USB cord, cut the end off, and solder the red and black wires together.

                    I'm not saying these vulnerabilities shouldn't be fixed, but these issues are hardly worth worrying about.

                    Comment

                    Working...
                    X