Unrated severityNVD Advisory· Published Nov 29, 2019· Updated Aug 5, 2024
CVE-2019-14895
CVE-2019-14895
Description
A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
26- lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.htmlmitrevendor-advisoryx_refsource_SUSE
- access.redhat.com/errata/RHSA-2020:0328mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2020:0339mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2020:0374mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2020:0375mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2020:0543mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2020:0592mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2020:0609mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2020:0653mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2020:0661mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2020:0664mitrevendor-advisoryx_refsource_REDHAT
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/mitrevendor-advisoryx_refsource_FEDORA
- usn.ubuntu.com/4225-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/4225-2/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/4226-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/4227-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/4227-2/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/4228-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/4228-2/mitrevendor-advisoryx_refsource_UBUNTU
- packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.htmlmitrex_refsource_MISC
- packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.htmlmitrex_refsource_MISC
- bugzilla.redhat.com/show_bug.cgimitrex_refsource_CONFIRM
- lists.debian.org/debian-lts-announce/2020/01/msg00013.htmlmitremailing-listx_refsource_MLIST
- lists.debian.org/debian-lts-announce/2020/03/msg00001.htmlmitremailing-listx_refsource_MLIST
- www.openwall.com/lists/oss-security/2019/11/22/2mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.