CVE-2019-2053

Published: 08 May 2019

In wnm_parse_neighbor_report_elem of wnm_sta.c, there is a possible out-of-bounds read due to missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9 Android ID: A-122074159

Priority

Negligible

CVSS 3 base score: 5.5

Status

Package Release Status
wpa
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(2.9-1ubuntu4)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(2.9-1ubuntu4)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(2.9-1ubuntu4)
Ubuntu 18.04 LTS (Bionic Beaver) Needed

Ubuntu 16.04 ESM (Xenial Xerus) Needed

Ubuntu 14.04 ESM (Trusty Tahr) Needed

Patches:
Upstream: https://w1.fi/cgit/hostap/commit/?id=e8ebef87cb4bb57a9d4b1ca3bc1ee2979ff8c297

Notes

AuthorNote
mdeslaur
per upstream: The actual read bytes would be stored locally,
but they were not used for anything, so other than reading
beyond the end of an allocated heap memory buffer, this did not
result in any behavior difference or exposure of the bytes.

References