Severity
9.8CRITICAL
EPSS
0.3%
top 42.60%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 29
Latest updateMay 24

Description

A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

NVDlinux/linux_kernel2.6.323.16.83+5
CVEListV5red_hat/kernelversion kernel-2.6.32
Debianlinux< 5.4.19-1+3

Also affects: Debian Linux 8.0, Ubuntu Linux 14.04, 16.04, 18.04, 19.10

Patches

🔴Vulnerability Details

10
GHSA
GHSA-4r86-rrx3-8x44: A stack-based buffer overflow was found in the Linux kernel, version kernel-22022-05-24
Kernel
fortify: Detect struct member overflows in memcpy() at compile-time2021-04-20
OSV
linux-hwe vulnerabilities2020-01-18
OSV
linux-azure vulnerabilities2020-01-07
OSV
linux, linux-aws, linux-aws-hwe, linux-azure, linux-gcp, linux-gke-4.15, linux-hwe, linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities2020-01-07

📋Vendor Advisories

9
Ubuntu
Linux kernel (HWE) vulnerabilities2020-01-18
Ubuntu
Linux kernel vulnerabilities2020-01-07
Ubuntu
Linux kernel vulnerabilities2020-01-07
Ubuntu
Linux kernel vulnerabilities2020-01-07
Ubuntu
Linux kernel (Xenial HWE) vulnerabilities2020-01-07

💬Community

2
Bugzilla
CVE-2019-14897 kernel: stack-based buffer overflow in add_ie_rates function in drivers/net/wireless/marvell/libertas/cfg.c [fedora-all]2019-11-25
Bugzilla
CVE-2019-14897 kernel: stack-based buffer overflow in add_ie_rates function in drivers/net/wireless/marvell/libertas/cfg.c2019-11-21