A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2068-1 linux security update
Debian DLA Debian DLA DLA-2114-1 linux-4.9 security update
EUVD EUVD EUVD-2019-6003 A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.
Ubuntu USN Ubuntu USN USN-4225-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-4225-2 Linux kernel (HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-4226-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-4227-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-4227-2 Linux kernel (Azure) vulnerabilities
Ubuntu USN Ubuntu USN USN-4228-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-4228-2 Linux kernel (Xenial HWE) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-05T00:26:39.202Z

Reserved: 2019-08-10T00:00:00

Link: CVE-2019-14897

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-11-29T15:15:10.950

Modified: 2024-11-21T04:27:38.293

Link: CVE-2019-14897

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-11-25T08:35:00Z

Links: CVE-2019-14897 - Bugzilla

cve-icon OpenCVE Enrichment

No data.