← Back to CVEs
CVE-2019-10126
CRITICAL9.8
Description
A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published6/14/2019
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
canonical:ubuntu_linuxdebian:debian_linuxlinux:linux_kernelnetapp:a700snetapp:a700s_firmwarenetapp:active_iq_unified_managernetapp:cn1610netapp:cn1610_firmwarenetapp:h610snetapp:h610s_firmwarenetapp:hci_management_nodenetapp:solidfireopensuse:leapredhat:enterprise_linuxredhat:enterprise_linux_ausredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_for_real_timeredhat:enterprise_linux_for_real_time_for_nfvredhat:enterprise_linux_for_real_time_for_nfv_tusredhat:enterprise_linux_for_real_time_tusredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstationredhat:virtualization
Weaknesses (CWE)
CWE-122CWE-787
References
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html(secalert@redhat.com)
http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html(secalert@redhat.com)
http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html(secalert@redhat.com)
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html(secalert@redhat.com)
http://www.securityfocus.com/bid/108817(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:3055(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:3076(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:3089(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:3309(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:3517(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2020:0174(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2020:0204(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10126(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html(secalert@redhat.com)
https://seclists.org/bugtraq/2019/Jul/33(secalert@redhat.com)
https://seclists.org/bugtraq/2019/Jun/26(secalert@redhat.com)
https://security.netapp.com/advisory/ntap-20190710-0002/(secalert@redhat.com)
https://support.f5.com/csp/article/K95593121(secalert@redhat.com)
https://usn.ubuntu.com/4093-1/(secalert@redhat.com)
https://usn.ubuntu.com/4094-1/(secalert@redhat.com)
https://usn.ubuntu.com/4095-1/(secalert@redhat.com)
https://usn.ubuntu.com/4095-2/(secalert@redhat.com)
https://usn.ubuntu.com/4117-1/(secalert@redhat.com)
https://usn.ubuntu.com/4118-1/(secalert@redhat.com)
https://www.debian.org/security/2019/dsa-4465(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/108817(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3055(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3076(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3089(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3309(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3517(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0174(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0204(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10126(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Jul/33(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Jun/26(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20190710-0002/(af854a3a-2127-422b-91ae-364da2661108)
https://support.f5.com/csp/article/K95593121(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4093-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4094-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4095-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4095-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4117-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4118-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4465(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.