Bug 1771909 (CVE-2019-17133)
Summary: | CVE-2019-17133 kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Dhananjay Arunesh <darunesh> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | acaringi, airlied, asavkov, bdettelb, bhu, blc, brdeoliv, bskeggs, dhoward, dvlasenk, esammons, fhrbata, hdegoede, hkrzesin, iboverma, ichavero, itamar, jarodwilson, jeremy, jforbes, jglisse, jlelli, joe.lawrence, john.j5live, jonathan, josef, jpoimboe, jross, jschorr, jshortt, jstancek, jthierry, jwboyer, kernel-maint, kernel-mgr, labbott, lgoncalv, lilu, linville, masami256, matt, mchehab, mcressma, mjg59, mlangsdo, nmurray, plougher, qzhao, rhandlin, rt-maint, rvrbovsk, steved, williams, wmealing, ycote, ykopkova |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A vulnerability was found in the Linux kernel's generic WiFi ESSID handling implementation. The flaw allows a system to join a wireless network where the ESSID is longer than the maximum length of 32 characters, which can cause the system to crash or execute code.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-01-21 20:09:57 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1771910, 1778625, 1778626, 1778627, 1778628, 1778629, 1778630, 1778631, 1778632, 1778633, 1778634, 1778635, 1778636, 1778637, 1778648, 1778649, 1778650, 1778651, 1778652, 1778653, 1778654, 1778655, 1778991, 1778992, 1778993, 1778994, 1778995, 1778996, 1778997, 1778998, 1778999 | ||
Bug Blocks: | 1771911 |
Description
Dhananjay Arunesh
2019-11-13 08:43:15 UTC
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1771910] This was fixed for Fedora with the 5.3.8 stable kernel updates From my initial understanding it appears as though this flaw requires getting the system to join a wireless network that has longer than the maximum expected length (32 characters according to the standard http://standards.ieee.org/getieee802/download/802.11-2007.pdf Section 7.3.2.1). The attacker could possibly corrupt elements on the stack or the stack value itself. This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:0174 https://access.redhat.com/errata/RHSA-2020:0174 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-17133 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:0374 https://access.redhat.com/errata/RHSA-2020:0374 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:0375 https://access.redhat.com/errata/RHSA-2020:0375 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.5 Extended Update Support Via RHSA-2020:0543 https://access.redhat.com/errata/RHSA-2020:0543 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.4 Advanced Update Support Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions Red Hat Enterprise Linux 7.4 Telco Extended Update Support Via RHSA-2020:0592 https://access.redhat.com/errata/RHSA-2020:0592 This issue has been addressed in the following products: Red Hat Enterprise MRG 2 Via RHSA-2020:0609 https://access.redhat.com/errata/RHSA-2020:0609 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.3 Advanced Update Support Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions Red Hat Enterprise Linux 7.3 Telco Extended Update Support Via RHSA-2020:0653 https://access.redhat.com/errata/RHSA-2020:0653 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.2 Advanced Update Support Via RHSA-2020:0661 https://access.redhat.com/errata/RHSA-2020:0661 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Extended Update Support Via RHSA-2020:0664 https://access.redhat.com/errata/RHSA-2020:0664 This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2020:0790 https://access.redhat.com/errata/RHSA-2020:0790 |