Bug 470761 - (CVE-2008-5134) CVE-2008-5134 kernel: libertas: fix buffer overrun
CVE-2008-5134 kernel: libertas: fix buffer overrun
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
Depends On: 470762
  Show dependency treegraph
Reported: 2008-11-09 22:52 EST by Eugene Teo (Security Response)
Modified: 2011-09-30 17:11 EDT (History)
6 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2011-09-30 17:11:26 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Eugene Teo (Security Response) 2008-11-09 22:52:53 EST
Description of problem:
From: Johannes Berg <johannes@sipsolutions.net>

If somebody sends an invalid beacon/probe response, that can trash the whole BSS descriptor. The descriptor is, luckily, large enough so that it cannot scribble past the end of it; it's well above 400 bytes long.
Comment 1 Eugene Teo (Security Response) 2008-11-09 22:53:04 EST
Reference: http://article.gmane.org/gmane.linux.kernel.wireless.general/23049
Comment 5 Eugene Teo (Security Response) 2008-12-05 00:32:04 EST
The driver was included in the upstream kernel since 2.6.22. We did not backport it to our RHEL kernels.
Comment 10 Eugene Teo (Security Response) 2008-12-10 19:03:29 EST
Our official statement can be found at:
Comment 12 Kurt Seifried 2011-09-30 17:11:26 EDT
This issue has been addressed in following products:

  Red Hat Enterprise MRG v1 for Red Hat Enterprise Linux (version 5)
Via RHSA-2009:0053 available at https://rhn.redhat.com/errata/RHSA-2009-0053.html

Note You need to log in before you can comment on or make changes to this bug.