TROYANOSYVIRUS
Voltar para CVEs

CVE-2019-10126

CRITICAL
9.8

Descricao

A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences.

Detalhes CVE

Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado6/14/2019
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0

Produtos afetados

canonical:ubuntu_linuxdebian:debian_linuxlinux:linux_kernelnetapp:a700snetapp:a700s_firmwarenetapp:active_iq_unified_managernetapp:cn1610netapp:cn1610_firmwarenetapp:h610snetapp:h610s_firmwarenetapp:hci_management_nodenetapp:solidfireopensuse:leapredhat:enterprise_linuxredhat:enterprise_linux_ausredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_for_real_timeredhat:enterprise_linux_for_real_time_for_nfvredhat:enterprise_linux_for_real_time_for_nfv_tusredhat:enterprise_linux_for_real_time_tusredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstationredhat:virtualization

Fraquezas (CWE)

CWE-122CWE-787

Referencias

https://usn.ubuntu.com/4093-1/(secalert@redhat.com)
https://usn.ubuntu.com/4094-1/(secalert@redhat.com)
https://usn.ubuntu.com/4095-1/(secalert@redhat.com)
https://usn.ubuntu.com/4095-2/(secalert@redhat.com)
https://usn.ubuntu.com/4117-1/(secalert@redhat.com)
https://usn.ubuntu.com/4118-1/(secalert@redhat.com)
http://www.securityfocus.com/bid/108817(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3055(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3076(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3089(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3309(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3517(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0174(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0204(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Jul/33(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Jun/26(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20190710-0002/(af854a3a-2127-422b-91ae-364da2661108)
https://support.f5.com/csp/article/K95593121(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4093-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4094-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4095-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4095-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4117-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4118-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4465(af854a3a-2127-422b-91ae-364da2661108)

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.