Description
A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2068-1 | linux security update |
Debian DLA |
DLA-2114-1 | linux-4.9 security update |
EUVD |
EUVD-2019-6003 | A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA. |
Ubuntu USN |
USN-4225-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4225-2 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-4226-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4227-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4227-2 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-4228-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4228-2 | Linux kernel (Xenial HWE) vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T00:26:39.202Z
Reserved: 2019-08-10T00:00:00.000Z
Link: CVE-2019-14897
No data.
Status : Modified
Published: 2019-11-29T15:15:10.950
Modified: 2024-11-21T04:27:38.293
Link: CVE-2019-14897
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN