ACK: [PATCH 0/1][SRU][B/D] CVE-2019-17666: rtl8822b buffer overflow

Stefan Bader stefan.bader at canonical.com
Fri Oct 18 07:36:31 UTC 2019


On 18.10.19 09:13, Tyler Hicks wrote:
> https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17666.html
> 
>  rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the
>  Linux kernel through 5.3.6 lacks a certain upper-bound check, leading
>  to a buffer overflow.
> 
> I've followed the suggestion from the rtlwifi maintainer here:
> 
>  https://lore.kernel.org/lkml/5B2DA6FDDF928F4E855344EE0A5C39D1D5C84368@RTITMBSVM04.realtek.com.tw/
> 
> A fix is not yet available upstream, which is why this is labeled a
> SAUCE patch.
> 
> Clean cherry pick to all releases. Build tested with clean build logs.
> 
> Tyler
> 
> Tyler Hicks (1):
>   UBUNTU: SAUCE: rtlwifi: rtl8822b: Fix potential overflow on P2P code
> 
>  drivers/staging/rtlwifi/ps.c | 4 ++--
>  1 file changed, 2 insertions(+), 2 deletions(-)
> 
Acked-by: Stefan Bader <stefan.bader at canonical.com>

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20191018/389228a2/attachment.sig>


More information about the kernel-team mailing list