APPLIED: [PATCH 0/1][SRU][B/D] CVE-2019-17666: rtl8822b buffer overflow
Khaled Elmously
khalid.elmously at canonical.com
Mon Oct 21 03:17:21 UTC 2019
On 2019-10-18 07:13:33 , Tyler Hicks wrote:
> https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17666.html
>
> rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the
> Linux kernel through 5.3.6 lacks a certain upper-bound check, leading
> to a buffer overflow.
>
> I've followed the suggestion from the rtlwifi maintainer here:
>
> https://lore.kernel.org/lkml/5B2DA6FDDF928F4E855344EE0A5C39D1D5C84368@RTITMBSVM04.realtek.com.tw/
>
> A fix is not yet available upstream, which is why this is labeled a
> SAUCE patch.
>
> Clean cherry pick to all releases. Build tested with clean build logs.
>
> Tyler
>
> Tyler Hicks (1):
> UBUNTU: SAUCE: rtlwifi: rtl8822b: Fix potential overflow on P2P code
>
> drivers/staging/rtlwifi/ps.c | 4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
>
> --
> 2.17.1
>
>
> --
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
More information about the kernel-team
mailing list