Note: This is a public test instance of Red Hat Bugzilla. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback at bugzilla.redhat.com.

Bug 1744130 (CVE-2019-14814)

Summary: CVE-2019-14814 kernel: heap overflow in mwifiex_set_uap_rates() function of Marvell Wifi Driver leading to DoS
Product: [Other] Security Response Reporter: Marian Rehak <mrehak>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: acaringi, airlied, bhu, blc, brdeoliv, bskeggs, dhoward, dvlasenk, esammons, fhrbata, hdegoede, hkrzesin, iboverma, ichavero, itamar, jarodwilson, jeremy, jforbes, jglisse, jlelli, john.j5live, jonathan, josef, jross, jshortt, jstancek, jwboyer, kernel-maint, kernel-mgr, labbott, lgoncalv, linville, masami256, matt, mchehab, mcressma, mjg59, mlangsdo, msiddiqu, nmurray, plougher, rt-maint, rvrbovsk, security-response-team, steved, williams, wmealing
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Linux kernel’s implementation of the Marvell wifi driver, which can allow a local user who has CAP_NET_ADMIN or administrative privileges to possibly cause a Denial Of Service (DOS) by corrupting memory and possible code execution.
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-01-21 20:09:39 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1775474, 1775475, 1775476, 1775477, 1775478, 1775479, 1776618, 1776622, 1780612, 1785195, 1785196    
Bug Blocks:    

Description Marian Rehak 2019-08-21 12:24:31 UTC
A flaw was found in the Linux kernels implementation of marvell wifi driver which can allow a local user who has CAP_NET_ADMIN or administrative privileges to possibly cause a Denial Of Service (DOS) by corrupting memory and possible code execution.

Comment 2 msiddiqu 2019-08-28 19:57:57 UTC
Acknowledgments:

Name: Huangwen (ADLab of Venustech)

Comment 3 msiddiqu 2019-08-28 20:01:15 UTC
*contents deleted*

Comment 4 msiddiqu 2019-08-28 20:01:20 UTC
References: 

https://www.openwall.com/lists/oss-security/2019/08/28/1

Comment 7 Wade Mealing 2019-11-22 03:57:20 UTC
Leaving this flaw rated as moderate due to the local privs required to activate this flaw already.

Comment 10 Petr Matousek 2019-12-06 14:08:16 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1780612]

Comment 11 Justin M. Forbes 2019-12-06 23:15:28 UTC
This was fixed for Fedora with the 5.2.17 stable kernel updates.

Comment 13 errata-xmlrpc 2020-01-21 15:49:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:0174 https://access.redhat.com/errata/RHSA-2020:0174

Comment 14 Product Security DevOps Team 2020-01-21 20:09:39 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-14814

Comment 15 errata-xmlrpc 2020-02-04 08:51:47 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:0328 https://access.redhat.com/errata/RHSA-2020:0328

Comment 16 errata-xmlrpc 2020-02-04 13:11:53 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:0339 https://access.redhat.com/errata/RHSA-2020:0339