{"id":"CVE-2019-17666","details":"rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.","modified":"2026-03-15T22:27:57.882811Z","published":"2019-10-17T02:15:13.477Z","related":["MGASA-2019-0306","MGASA-2019-0333","SUSE-SU-2019:2879-1","SUSE-SU-2019:2946-1","SUSE-SU-2019:2947-1","SUSE-SU-2019:2949-1","SUSE-SU-2019:2951-1","SUSE-SU-2019:2952-1","SUSE-SU-2019:2953-1","SUSE-SU-2019:2984-1","SUSE-SU-2019:3200-1","SUSE-SU-2019:3294-1","SUSE-SU-2019:3295-1","SUSE-SU-2020:0093-1","openSUSE-SU-2019:2392-1","openSUSE-SU-2019:2444-1","openSUSE-SU-2024:10728-1","openSUSE-SU-2024:10895-1","openSUSE-SU-2024:13704-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRBP4O6D2SQ2NHCRHTJONGCZLWOIV5MN/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0328"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0661"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20191031-0005/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0339"},{"type":"ADVISORY","url":"https://twitter.com/nicowaisman/status/1184864519316758535"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0543"},{"type":"ADVISORY","url":"https://arstechnica.com/information-technology/2019/10/unpatched-linux-flaw-may-let-attackers-crash-or-compromise-nearby-devices/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4184-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4185-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4186-2/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0740"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4183-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4186-1/"},{"type":"FIX","url":"https://lkml.org/lkml/2019/10/16/1226"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-17666.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"3.16.77"}]},{"events":[{"introduced":"3.17"},{"fixed":"4.4.199"}]},{"events":[{"introduced":"4.5"},{"fixed":"4.9.199"}]},{"events":[{"introduced":"4.10"},{"fixed":"4.14.152"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.19.82"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.2"}]},{"events":[{"introduced":"5.3"},{"fixed":"5.3.9"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.10"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}