A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2068-1 | linux security update |
Debian DLA |
DLA-2114-1 | linux-4.9 security update |
EUVD |
EUVD-2019-6003 | A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA. |
Ubuntu USN |
USN-4225-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4225-2 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-4226-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4227-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4227-2 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-4228-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4228-2 | Linux kernel (Xenial HWE) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T00:26:39.202Z
Reserved: 2019-08-10T00:00:00
Link: CVE-2019-14897
No data.
Status : Modified
Published: 2019-11-29T15:15:10.950
Modified: 2024-11-21T04:27:38.293
Link: CVE-2019-14897
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN