Bug 1713059 (CVE-2019-3846) - CVE-2019-3846 kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c
Summary: CVE-2019-3846 kernel: Heap overflow in mwifiex_update_bss_desc_with_ie functi...
Status: NEW
Alias: CVE-2019-3846
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=important,public=20190530:1253...
Keywords: Security
Depends On: 1714468 1714469 1714470 1714471 1714472 1714473 1714474 1714475 1714476 1714477 1715475
Blocks: 1713060
TreeView+ depends on / blocked
 
Reported: 2019-05-22 18:45 UTC by Pedro Sampaio
Modified: 2019-05-30 15:45 UTC (History)
44 users (show)

(edit)
A flaw was found in the Linux kernel's Marvell wifi chip driver. A heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c allows remote attackers to cause a denial of service(system crash) or execute arbitrary code.
Clone Of:
(edit)
Last Closed:


Attachments (Terms of Use)

Description Pedro Sampaio 2019-05-22 18:45:25 UTC
A flaw was found in Marvell wifi chip driver in Linux kernel. A heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c allows remote attackers to cause a denial of service(system crash) or possibly execute arbitrary code.

Upstream patch submission:

https://lore.kernel.org/linux-wireless/20190529125220.17066-1-tiwai@suse.de/

Comment 5 Wade Mealing 2019-05-28 07:34:05 UTC
Mitigation:

This flaw requires a system with marvell wifi network card to be attempting to connect to a attacker controlled wifi network.  A temporary mitigation may be to only connect to known-good networks via wifi, or connect to a network via ethernet.  Alternatively if wireless networking is not used the mwifiex kernel module can be blacklisted to prevent misuse of the vulnerable code.

Comment 6 Wade Mealing 2019-05-28 08:01:47 UTC
Statement:

This flaw is currently rated as Important as it is possible for an attacker to setup a wifi access point with identical configuration in another location and intercept have the system auto connect and possibly be exploited.

Comment 9 Petr Matousek 2019-05-30 12:55:07 UTC
External References:

https://seclists.org/oss-sec/2019/q2/133

Comment 10 Petr Matousek 2019-05-30 12:56:38 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1715475]

Comment 11 Petr Matousek 2019-05-30 13:00:36 UTC
Acknowledgments:

Name: huangwen (ADLab of Venustech)


Note You need to log in before you can comment on or make changes to this bug.