Bug 1760306 (CVE-2019-16746)

Summary: CVE-2019-16746 kernel: buffer-overflow hardening in WiFi beacon validation code.
Product: [Other] Security Response Reporter: Dhananjay Arunesh <darunesh>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: acaringi, airlied, bdettelb, bhu, blc, brdeoliv, bskeggs, dhoward, dvlasenk, esammons, fhrbata, hdegoede, hkrzesin, iboverma, ichavero, itamar, jarodwilson, jeremy, jforbes, jglisse, jlelli, john.j5live, jonathan, josef, jross, jschorr, jshortt, jstancek, jwboyer, kernel-maint, kernel-mgr, labbott, lgoncalv, linville, masami256, matt, mchehab, mcressma, mjg59, mlangsdo, nmurray, plougher, rtillery, rt-maint, rvrbovsk, sparks, steved, williams, wmealing
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw in the Linux kernel's WiFi beacon validation code was discovered. The code does not check the length of the variable length elements in the beacon head potentially leading to a buffer overflow. System availability, as well as data confidentiality and integrity, can be impacted by this vulnerability.
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-03-31 22:35:35 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1748266, 1760307, 1781448, 1781449, 1781450, 1781451, 1781452, 1781453    
Bug Blocks: 1760308    

Description Dhananjay Arunesh 2019-10-10 11:12:09 UTC
An issue was discovered in the Linux kernels wifi beacon validation code. The parser does not check the length of variable length elements in the beacon head.  This could lead to a buffer overflow in code that relies on these values being within the specification.

Reference:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f88eb7c0d002a67ef31aeb7850b42ff69abc46dc

Comment 1 Dhananjay Arunesh 2019-10-10 11:12:46 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1760307]

Comment 8 errata-xmlrpc 2020-03-31 19:12:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:1016 https://access.redhat.com/errata/RHSA-2020:1016

Comment 9 errata-xmlrpc 2020-03-31 19:21:13 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:1070 https://access.redhat.com/errata/RHSA-2020:1070

Comment 10 Product Security DevOps Team 2020-03-31 22:35:35 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-16746