9.8

CVE-2019-14895

A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinuxLinux Kernel Version >= 3.7 < 3.16.81
LinuxLinux Kernel Version >= 3.17 < 4.4.210
LinuxLinux Kernel Version >= 4.5 < 4.9.210
LinuxLinux Kernel Version >= 4.10 < 4.14.165
LinuxLinux Kernel Version >= 4.15 < 4.19.96
LinuxLinux Kernel Version >= 4.20 < 5.4.12
DebianDebian Linux Version8.0
CanonicalUbuntu Linux Version14.04 SwEditionesm
CanonicalUbuntu Linux Version16.04 SwEditionesm
CanonicalUbuntu Linux Version18.04 SwEditionlts
CanonicalUbuntu Linux Version19.04
CanonicalUbuntu Linux Version19.10
FedoraprojectFedora Version30
FedoraprojectFedora Version31
OpensuseLeap Version15.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 3% 0.861
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
secalert@redhat.com 8 2.1 5.9
CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-122 Heap-based Buffer Overflow

A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().

CWE-787 Out-of-bounds Write

The product writes data past the end, or before the beginning, of the intended buffer.

https://usn.ubuntu.com/4225-1/
Third Party Advisory
https://usn.ubuntu.com/4225-2/
Third Party Advisory
https://usn.ubuntu.com/4226-1/
Third Party Advisory
https://usn.ubuntu.com/4227-1/
Third Party Advisory
https://usn.ubuntu.com/4227-2/
Third Party Advisory
https://usn.ubuntu.com/4228-1/
Third Party Advisory
https://usn.ubuntu.com/4228-2/
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14895
Patch
Third Party Advisory
Issue Tracking
https://www.openwall.com/lists/oss-security/2019/11/22/2
Patch
Third Party Advisory
Mailing List