[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2024030254-CVE-2023-52525-3989@gregkh>
Date: Sat, 2 Mar 2024 22:53:09 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: CVE-2023-52525: wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet
Only skip the code path trying to access the rfc1042 headers when the
buffer is too small, so the driver can still process packets without
rfc1042 headers.
The Linux kernel CVE team has assigned CVE-2023-52525 to this issue.
Affected and fixed versions
===========================
Issue introduced in 4.14.326 with commit a7a35f35b7a4 and fixed in 4.14.327 with commit 71b1d2b57f14
Issue introduced in 4.19.295 with commit 68a1716869af and fixed in 4.19.296 with commit 16cc18b90808
Issue introduced in 5.4.257 with commit df1753eae74b and fixed in 5.4.258 with commit b8e260654a29
Issue introduced in 5.10.195 with commit 08a6e99a334d and fixed in 5.10.198 with commit 10a18c8bac7f
Issue introduced in 5.15.132 with commit 89f19a9a055d and fixed in 5.15.135 with commit 5afb996349cb
Issue introduced in 6.1.53 with commit cde525d61178 and fixed in 6.1.57 with commit 6b706286473d
Issue introduced in 6.5.3 with commit 7be3bf0bb299 and fixed in 6.5.7 with commit be2ff39b1504
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2023-52525
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
drivers/net/wireless/marvell/mwifiex/sta_rx.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/71b1d2b57f145c8469aa9346f0fd57bf59b2b89c
https://git.kernel.org/stable/c/16cc18b9080892d1a0200a38e36ae52e464bc555
https://git.kernel.org/stable/c/b8e260654a29de872e7cb85387d8ab8974694e8e
https://git.kernel.org/stable/c/10a18c8bac7f60d32b7af22da03b66f350beee38
https://git.kernel.org/stable/c/5afb996349cb6d1f14d6ba9aaa7aed3bd82534f6
https://git.kernel.org/stable/c/6b706286473db4fd54b5f869faa67f4a8cb18e99
https://git.kernel.org/stable/c/be2ff39b1504c5359f4a083c1cfcad21d666e216
Powered by blists - more mailing lists