A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-2068-1 | linux security update |
![]() |
DLA-2114-1 | linux-4.9 security update |
![]() |
EUVD-2019-6003 | A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA. |
![]() |
USN-4225-1 | Linux kernel vulnerabilities |
![]() |
USN-4225-2 | Linux kernel (HWE) vulnerabilities |
![]() |
USN-4226-1 | Linux kernel vulnerabilities |
![]() |
USN-4227-1 | Linux kernel vulnerabilities |
![]() |
USN-4227-2 | Linux kernel (Azure) vulnerabilities |
![]() |
USN-4228-1 | Linux kernel vulnerabilities |
![]() |
USN-4228-2 | Linux kernel (Xenial HWE) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T00:26:39.202Z
Reserved: 2019-08-10T00:00:00
Link: CVE-2019-14897

No data.

Status : Modified
Published: 2019-11-29T15:15:10.950
Modified: 2024-11-21T04:27:38.293
Link: CVE-2019-14897


No data.