{"id":"CVE-2019-14897","details":"A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.","modified":"2026-03-12T23:00:37.061098Z","published":"2019-11-29T15:15:10.950Z","related":["MGASA-2020-0073","MGASA-2020-0089","SUSE-SU-2020:0183-1","SUSE-SU-2020:0204-1","SUSE-SU-2020:0511-1","SUSE-SU-2020:0558-1","SUSE-SU-2020:0559-1","SUSE-SU-2020:0560-1","SUSE-SU-2020:0580-1","SUSE-SU-2020:0584-1","SUSE-SU-2020:0599-1","SUSE-SU-2020:0605-1","SUSE-SU-2020:0613-1","SUSE-SU-2020:1255-1","SUSE-SU-2020:1275-1","SUSE-SU-2020:14354-1","SUSE-SU-2020:1663-1","openSUSE-SU-2020:0336-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4227-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4227-2/"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4225-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4225-2/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4228-2/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4228-1/"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4226-1/"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14897"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"2.6.32"},{"fixed":"3.16.83"}]},{"events":[{"introduced":"3.17"},{"fixed":"4.4.212"}]},{"events":[{"introduced":"4.5"},{"fixed":"4.9.212"}]},{"events":[{"introduced":"4.10"},{"fixed":"4.14.169"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.19.100"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.16"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.10"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-14897.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}