lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2024030254-CVE-2023-52525-3989@gregkh>
Date: Sat,  2 Mar 2024 22:53:09 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: CVE-2023-52525: wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet

Only skip the code path trying to access the rfc1042 headers when the
buffer is too small, so the driver can still process packets without
rfc1042 headers.

The Linux kernel CVE team has assigned CVE-2023-52525 to this issue.


Affected and fixed versions
===========================

	Issue introduced in 4.14.326 with commit a7a35f35b7a4 and fixed in 4.14.327 with commit 71b1d2b57f14
	Issue introduced in 4.19.295 with commit 68a1716869af and fixed in 4.19.296 with commit 16cc18b90808
	Issue introduced in 5.4.257 with commit df1753eae74b and fixed in 5.4.258 with commit b8e260654a29
	Issue introduced in 5.10.195 with commit 08a6e99a334d and fixed in 5.10.198 with commit 10a18c8bac7f
	Issue introduced in 5.15.132 with commit 89f19a9a055d and fixed in 5.15.135 with commit 5afb996349cb
	Issue introduced in 6.1.53 with commit cde525d61178 and fixed in 6.1.57 with commit 6b706286473d
	Issue introduced in 6.5.3 with commit 7be3bf0bb299 and fixed in 6.5.7 with commit be2ff39b1504

Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2023-52525
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	drivers/net/wireless/marvell/mwifiex/sta_rx.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/71b1d2b57f145c8469aa9346f0fd57bf59b2b89c
	https://git.kernel.org/stable/c/16cc18b9080892d1a0200a38e36ae52e464bc555
	https://git.kernel.org/stable/c/b8e260654a29de872e7cb85387d8ab8974694e8e
	https://git.kernel.org/stable/c/10a18c8bac7f60d32b7af22da03b66f350beee38
	https://git.kernel.org/stable/c/5afb996349cb6d1f14d6ba9aaa7aed3bd82534f6
	https://git.kernel.org/stable/c/6b706286473db4fd54b5f869faa67f4a8cb18e99
	https://git.kernel.org/stable/c/be2ff39b1504c5359f4a083c1cfcad21d666e216

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ