← Zuruck zu CVEs
CVE-2019-17666
HIGH8.8
Beschreibung
rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.
CVE Details
CVSS v3.1 Bewertung8.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorADJACENT_NETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht10/17/2019
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
canonical:ubuntu_linuxdebian:debian_linuxlinux:linux_kernel
Schwachen (CWE)
CWE-120
Referenzen
https://access.redhat.com/errata/RHSA-2020:0328(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0339(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0543(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0661(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0740(cve@mitre.org)
https://arstechnica.com/information-technology/2019/10/unpatched-linux-flaw-may-let-attackers-crash-or-compromise-nearby-devices/(cve@mitre.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRBP4O6D2SQ2NHCRHTJONGCZLWOIV5MN/(cve@mitre.org)
https://lkml.org/lkml/2019/10/16/1226(cve@mitre.org)
https://security.netapp.com/advisory/ntap-20191031-0005/(cve@mitre.org)
https://twitter.com/nicowaisman/status/1184864519316758535(cve@mitre.org)
https://usn.ubuntu.com/4183-1/(cve@mitre.org)
https://usn.ubuntu.com/4184-1/(cve@mitre.org)
https://usn.ubuntu.com/4185-1/(cve@mitre.org)
https://usn.ubuntu.com/4186-1/(cve@mitre.org)
https://usn.ubuntu.com/4186-2/(cve@mitre.org)
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0328(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0339(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0543(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0661(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0740(af854a3a-2127-422b-91ae-364da2661108)
https://arstechnica.com/information-technology/2019/10/unpatched-linux-flaw-may-let-attackers-crash-or-compromise-nearby-devices/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRBP4O6D2SQ2NHCRHTJONGCZLWOIV5MN/(af854a3a-2127-422b-91ae-364da2661108)
https://lkml.org/lkml/2019/10/16/1226(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20191031-0005/(af854a3a-2127-422b-91ae-364da2661108)
https://twitter.com/nicowaisman/status/1184864519316758535(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4183-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4184-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4185-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4186-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4186-2/(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.