Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 1 Jul 2011 10:48:58 +0200
From: Petr Matousek <>
Cc: "Steven M. Christey" <>
Subject: CVE request: kernel: nl80211: missing check for valid SSID size in
 scan operations

In both trigger_scan and sched_scan operations, we were checking for the
SSID length before assigning the value correctly.  Since the memory was
just kzalloc'ed, the check was always failing and SSID with over 32
characters were allowed to go through.

This is causing a buffer overflow when copying the actual SSID to the
proper place.

Please note that it needs CAP_NET_ADMIN privileges.

Upstream commits:


Petr Matousek / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.