← Volver a CVEs
CVE-2019-17666
HIGH8.8
Descripcion
rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.
Detalles CVE
Puntuacion CVSS v3.18.8
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueADJACENT_NETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado10/17/2019
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
canonical:ubuntu_linuxdebian:debian_linuxlinux:linux_kernel
Debilidades (CWE)
CWE-120
Referencias
https://access.redhat.com/errata/RHSA-2020:0328(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0339(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0543(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0661(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0740(cve@mitre.org)
https://arstechnica.com/information-technology/2019/10/unpatched-linux-flaw-may-let-attackers-crash-or-compromise-nearby-devices/(cve@mitre.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRBP4O6D2SQ2NHCRHTJONGCZLWOIV5MN/(cve@mitre.org)
https://lkml.org/lkml/2019/10/16/1226(cve@mitre.org)
https://security.netapp.com/advisory/ntap-20191031-0005/(cve@mitre.org)
https://twitter.com/nicowaisman/status/1184864519316758535(cve@mitre.org)
https://usn.ubuntu.com/4183-1/(cve@mitre.org)
https://usn.ubuntu.com/4184-1/(cve@mitre.org)
https://usn.ubuntu.com/4185-1/(cve@mitre.org)
https://usn.ubuntu.com/4186-1/(cve@mitre.org)
https://usn.ubuntu.com/4186-2/(cve@mitre.org)
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0328(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0339(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0543(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0661(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0740(af854a3a-2127-422b-91ae-364da2661108)
https://arstechnica.com/information-technology/2019/10/unpatched-linux-flaw-may-let-attackers-crash-or-compromise-nearby-devices/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRBP4O6D2SQ2NHCRHTJONGCZLWOIV5MN/(af854a3a-2127-422b-91ae-364da2661108)
https://lkml.org/lkml/2019/10/16/1226(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20191031-0005/(af854a3a-2127-422b-91ae-364da2661108)
https://twitter.com/nicowaisman/status/1184864519316758535(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4183-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4184-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4185-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4186-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4186-2/(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.