Note: This is a public test instance of Red Hat Bugzilla. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback at bugzilla.redhat.com.
Bug 1913348 (CVE-2020-36158) - CVE-2020-36158 kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value
Summary: CVE-2020-36158 kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start fun...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-36158
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1913349 1914995 1914996 1914998 1914999 1915000
Blocks:
TreeView+ depends on / blocked
 
Reported: 2021-01-06 14:56 UTC by Guilherme de Almeida Suckevicz
Modified: 2024-03-25 17:45 UTC (History)
46 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Linux kernel. The marvell wifi driver could allow a local attacker to execute arbitrary code via a long SSID value in mwifiex_cmd_802_11_ad_hoc_start function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Clone Of:
Environment:
Last Closed: 2021-11-08 16:52:53 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2021:4140 0 None None None 2021-11-09 17:21:31 UTC
Red Hat Product Errata RHSA-2021:4356 0 None None None 2021-11-09 18:23:21 UTC

Description Guilherme de Almeida Suckevicz 2021-01-06 14:56:47 UTC
mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value.

Reference and upstream patch:
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c455c5ab332773464d02ba17015acdca198f03d

Comment 1 Guilherme de Almeida Suckevicz 2021-01-06 14:57:41 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1913349]

Comment 4 Alex 2021-01-11 17:44:11 UTC
Mitigation:

To mitigate this issue, prevent the module mwifiex from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.

Comment 5 Petr Matousek 2021-01-14 12:14:15 UTC
Statement:

This issue is rated as having Moderate impact because the attacker needs to be local and privileged enough to be able to initiate ad-hoc WIFI network creation.

Comment 20 errata-xmlrpc 2021-11-09 17:21:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:4140 https://access.redhat.com/errata/RHSA-2021:4140

Comment 21 errata-xmlrpc 2021-11-09 18:23:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:4356 https://access.redhat.com/errata/RHSA-2021:4356


Note You need to log in before you can comment on or make changes to this bug.