Headline
CVE-2019-17133: '[PATCH 2/2] cfg80211: wext: Reject malformed SSID elements'
In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.
[prev in list] [next in list] [prev in thread] [next in thread] List: linux-wireless Subject: [PATCH 2/2] cfg80211: wext: Reject malformed SSID elements From: Will Deacon <will () kernel ! org> Date: 2019-10-04 9:51:32 Message-ID: 20191004095132.15777-2-will () kernel ! org [Download RAW message or body]
Ensure the SSID element is bounds-checked prior to invoking memcpy() with its length field.
Cc: [email protected] Cc: Johannes Berg [email protected] Cc: Kees Cook [email protected] Reported-by: Nicolas Waisman [email protected] Signed-off-by: Will Deacon [email protected]
net/wireless/wext-sme.c | 8 +++++±- 1 file changed, 6 insertions(+), 2 deletions(-)
diff --git a/net/wireless/wext-sme.c b/net/wireless/wext-sme.c index c67d7a82ab13…3fd2cc7fc36a 100644 — a/net/wireless/wext-sme.c +++ b/net/wireless/wext-sme.c @@ -201,6 +201,7 @@ int cfg80211_mgd_wext_giwessid(struct net_device *dev, struct iw_request_info *info, struct iw_point *data, char *ssid) {
int ret = 0; struct wireless_dev *wdev = dev->ieee80211_ptr;
/* call only for station! */ @@ -219,7 +220,10 @@ int cfg80211_mgd_wext_giwessid(struct net_device *dev, if (ie) { data->flags = 1; data->length = ie[1];
memcpy(ssid, ie + 2, data->length);
if (data->length > IW\_ESSID\_MAX\_SIZE)
ret = -EINVAL;
else
} else if (wdev->wext.connect.ssid && wdev->wext.connect.ssid_len) { @@ -229,7 +233,7 @@ int cfg80211_mgd_wext_giwessid(struct net_device *dev, } wdev_unlock(wdev);memcpy(ssid, ie + 2, data->length); } rcu\_read\_unlock();
- return 0;
- return ret; }
int cfg80211_mgd_wext_siwap(struct net_device *dev,
2.23.0.581.g78d2f28ef7-goog
[prev in list] [next in list] [prev in thread] [next in thread]
Configure | About | News | Add a list | Sponsored by KoreLogic
Related news
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CV...