Multiple Ralink wireless drivers: Execution of arbitrary code An integer overflow in multiple Ralink wireless drivers might lead to the execution of arbitrary code with elevated privileges. rt2400 rt2500 rt2570 rt61 ralink-rt61 2009-07-12 2009-07-12 257023 remote 1.2.2_beta3 1.1.0_pre2007071515 20070209 1.1.0_beta2 1.1.1.0

All listed packages are external kernel modules that provide drivers for multiple Ralink devices. ralink-rt61 is released by ralinktech.com, the other packages by the rt2x00.serialmonkey.com project.

Aviv reported an integer overflow in multiple Ralink wireless card drivers when processing a probe request packet with a long SSID, possibly related to an integer signedness error.

A physically proximate attacker could send specially crafted packets to a user who has wireless networking enabled, possibly resulting in the execution of arbitrary code with root privileges.

Unload the kernel modules.

All external kernel modules have been masked and we recommend that users unmerge those drivers. The Linux mainline kernel has equivalent support for these devices and the vulnerability has been resolved in stable versions of sys-kernel/gentoo-sources.

# emerge --unmerge "net-wireless/rt2400" # emerge --unmerge "net-wireless/rt2500" # emerge --unmerge "net-wireless/rt2570" # emerge --unmerge "net-wireless/rt61" # emerge --unmerge "net-wireless/ralink-rt61"
CVE-2009-0282 rbu rbu rbu