Bug 1760307
Summary: | CVE-2019-16746 kernel: buffer-overflow in net/wireless/nl80211.c [fedora-all] | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Dhananjay Arunesh <darunesh> |
Component: | kernel | Assignee: | Kernel Maintainer List <kernel-maint> |
Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 30 | CC: | airlied, awilliam, bskeggs, fzatlouk, hdegoede, ichavero, itamar, jarodwilson, jeremy, jforbes, jglisse, john.j5live, jonathan, josef, jwboyer, kernel-maint, klember, labbott, linville, masami256, mchehab, mjg59, pasik, pbrobinson, pwhalen, robatino, steved |
Target Milestone: | --- | Keywords: | Security, SecurityTracking |
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | AcceptedFreezeException | ||
Fixed In Version: | kernel-5.3.6-300.fc31 kernel-5.3.6-200.fc30 | Doc Type: | No Doc Update |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2019-10-17 21:38:11 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 1644939, 1644940, 1760306 |
Description
Dhananjay Arunesh
2019-10-10 11:12:38 UTC
Use the following template to for the 'fedpkg update' request to submit an update for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure that all associated bugs get updated when new packages are pushed to stable. ===== # bugfix, security, enhancement, newpackage (required) type=security # low, medium, high, urgent (required) severity=medium # testing, stable request=testing # Bug numbers: 1234,9876 bugs=1760306,1760307 # Description of your update notes=Security fix for [PUT CVEs HERE] # Enable request automation based on the stable/unstable karma thresholds autokarma=True stable_karma=3 unstable_karma=-3 # Automatically close bugs when this marked as stable close_bugs=True # Suggest that users restart after update suggest_reboot=False ====== Additionally, you may opt to use the bodhi web interface to submit updates: https://bodhi.fedoraproject.org/updates/new FEDORA-2019-057d691fd4 has been submitted as an update to Fedora 30. https://bodhi.fedoraproject.org/updates/FEDORA-2019-057d691fd4 FEDORA-2019-038d78eaa5 has been submitted as an update to Fedora 31. https://bodhi.fedoraproject.org/updates/FEDORA-2019-038d78eaa5 kernel-5.3.6-300.fc31, kernel-headers-5.3.6-300.fc31, kernel-tools-5.3.6-300.fc31 has been pushed to the Fedora 31 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2019-038d78eaa5 Proposed as a Blocker for 31-final by Fedora user pbrobinson using the blocker tracking app because: "The release must contain no known security bugs of 'important' or higher impact according to the Red Hat severity classification scale which cannot be satisfactorily resolved by a package update (e.g. issues during installation)." https://fedoraproject.org/wiki/Fedora_31_Final_Release_Criteria#Security_bugs I don't see a Red Hat classification but Debian rates this as "high (attack range: remote)" and given that live images aren't upgraded for the lifetime we probably don't want this hanging around for a full cycle. https://security-tracker.debian.org/tracker/CVE-2019-16746 kernel-5.3.6-200.fc30, kernel-headers-5.3.6-200.fc30, kernel-tools-5.3.6-200.fc30 has been pushed to the Fedora 30 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2019-057d691fd4 Per https://access.redhat.com/security/cve/CVE-2019-16746 , the impact of this bug is rated 'moderate', not 'important'. But...oddly, that page claims the attack vector is 'local' while NVD calls it 'remote'. So I'm a bit suspicious of that rating. I think I'm at least +1 FE for this, though it's unfortunate that we get an entire new kernel version to fix it, not just an update with a fix for this specific issue. By policy updates for blocker/FE bugs are supposed to be as targeted as possible. (In reply to Adam Williamson from comment #7) > Per https://access.redhat.com/security/cve/CVE-2019-16746 , the impact of > this bug is rated 'moderate', not 'important'. But...oddly, that page claims > the attack vector is 'local' while NVD calls it 'remote'. So I'm a bit > suspicious of that rating. And the supposed elX related bug is locked down. Given it's network/80211 related I suspect the high is that something outside the device can cause at least a DDoS, whether that then allows a RCE is unknown and I suspect that's the delta. I couldn't find anything public to tell and hence I erred on the side of caution. > I think I'm at least +1 FE for this, though it's unfortunate that we get an > entire new kernel version to fix it, not just an update with a fix for this > specific issue. By policy updates for blocker/FE bugs are supposed to be as > targeted as possible. Unfortunately due to the lack of resources that's the way the kernel dev works in Fedora. +1 FE, especially now that it looks like we're not shipping this week so there's more time to find and fix any possible regressions. +1 FE, I think we have time to fix issues before GA if something pops out. +1 FE this at least has enough votes to be accepted as an FE, so let's do that. Discussed at 2019-10-17 Fedora 31 go/no-go meeting, acting as a blocker review meeting: https://meetbot-raw.fedoraproject.org/fedora-meeting-1/2019-10-17/f31-final-go_no_go-meeting.2019-10-17-17.00.html . We noted the lack of certainty about exactly how severe this bug is and decided to defer deciding on blocker status till the Monday blocker review meeting (except we're assuming that between now and then, the fix will be pushed stable and we won't have to worry about it, as this is already accepted as an FE). kernel-5.3.6-300.fc31, kernel-headers-5.3.6-300.fc31, kernel-tools-5.3.6-300.fc31 has been pushed to the Fedora 31 stable repository. If problems still persist, please make note of it in this bug report. kernel-5.3.6-200.fc30, kernel-headers-5.3.6-200.fc30, kernel-tools-5.3.6-200.fc30 has been pushed to the Fedora 30 stable repository. If problems still persist, please make note of it in this bug report. |