1

oss-security - Various Linux Kernel WLAN security issues (RCE/DOS) found

 1 year ago
source link: https://www.openwall.com/lists/oss-security/2022/10/13/2
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

Various Linux Kernel WLAN security issues (RCE/DOS) found

Follow @Openwall on Twitter for new release announcements and other news

[<prev] [next>] [thread-next>] [day] [month] [year] [list]

Date: Thu, 13 Oct 2022 12:10:54 +0200
From: Marcus Meissner <[email protected]>
To: [email protected], [email protected]
Subject: Various Linux Kernel WLAN security issues (RCE/DOS) found

Hi folks,

Security Researcher Soenke Huster from Tu Darmstadt (
[email protected] ) emailed SUSE with a buffer overwrite in
the Linux Kernel mac80211 framework triggered by WLAN frames.

We delegated the issue to the kernel security folks, and Soenke and
Johannes Berg from Intel evaluated and worked on this issue.

During their research they found multiple more problems in the WLAN
stack, exploitable over the air.

The patchset has been posted to the netdev list just now and will be
merged in the next hours/days:

	https://lore.kernel.org/netdev/[email protected]/T/#u

I have requested 5 CVE from Mitre, they are referenced in the commits.

Note that some patches did not get CVEs, as these were not showing any
relevant security impact but only warning messages or UBSAN shift overflow
messages.

CVE-2022-41674: fix u8 overflow in cfg80211_update_notlisted_nontrans
	(max 256 byte overwrite) (RCE)
CVE-2022-42719: wifi: mac80211: fix MBSSID parsing use-after-free
	use after free condition (RCE)
CVE-2022-42720: wifi: cfg80211: fix BSS refcounting bugs
	ref counting use-after-free possibilities (RCE)
CVE-2022-42721: wifi: cfg80211: avoid nontransmitted BSS list corruption
	list corruption, according to Johannes will however just make it endless loop (DOS)
CVE-2022-42722: wifi: mac80211: fix crash in beacon protection for P2P-device
	NULL ptr dereference crash (DOS)

Soenke will post additional details as followup to this email.

Ciao, Marcus

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK