mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://patchwork.kernel.org/project/linux-wireless/patch/20201206084801.26479-1-ruc_zhangxiaohui%40163.com/ | |
https://lore.kernel.org/r/20201206084801.26479-1-ruc_zhangxiaohui%40163.com | |
https://github.com/torvalds/linux/commit/5c455c5ab332773464d02ba17015acdca198f03d | third party advisory patch |
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c455c5ab332773464d02ba17015acdca198f03d | patch vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCHBIRS27VMOGMBHPWP2R7SZRFXT6O6U/ | vendor advisory |
https://www.debian.org/security/2021/dsa-4843 | third party advisory vendor advisory |
https://security.netapp.com/advisory/ntap-20210212-0002/ | third party advisory |
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html | third party advisory mailing list |