Linux kernel Marvell WiFi chip driver 缓冲区错误漏洞

admin 2024-01-13 23:40:11 YS 来源:ZONE.CI 全球网 0 阅读模式
> Linux kernel Marvell WiFi chip driver 缓冲区错误漏洞

Linux kernel Marvell WiFi chip driver 缓冲区错误漏洞

CNNVD-ID编号 CNNVD-201911-1325 CVE编号 CVE-2019-14896
发布时间 2019-11-22 更新时间 2020-08-31
漏洞类型 缓冲区错误 漏洞来源 Red Hat,Benjamin M. Romer
危险等级 中危 威胁类型 远程
厂商 N/A

漏洞介绍

Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。Marvell WiFi chip driver是其中的的一个WiFi芯片驱动程序。

Linux kernel-2.6.32版本中的Marvell WiFi chip driver存在缓冲区错误漏洞。该漏洞源于网络系统或产品在内存上执行操作时,未正确验证数据边界,导致向关联的其他内存位置上执行了错误的读写操作。攻击者可利用该漏洞导致缓冲区溢出或堆溢出等。

漏洞补丁

目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法:

参考网址

来源:CONFIRM

链接:https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14896

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/

来源:MISC

链接:https://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html

来源:UBUNTU

链接:https://usn.ubuntu.com/4225-1/

来源:UBUNTU

链接:https://usn.ubuntu.com/4226-1/

来源:UBUNTU

链接:https://usn.ubuntu.com/4228-2/

来源:UBUNTU

链接:https://usn.ubuntu.com/4227-1/

来源:UBUNTU

链接:https://usn.ubuntu.com/4228-1/

来源:CONFIRM

链接:https://security.netapp.com/advisory/ntap-20200103-0001/

来源:UBUNTU

链接:https://usn.ubuntu.com/4227-2/

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/

来源:lists.debian.org

链接:https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2020/suse-su-20200183-1.html

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4228-1/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4227-1/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4226-1/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4225-1/

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2019-14896

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0719/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1585/

来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2019-14896

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/Linux-kernel-buffer-overflow-via-libertas-add-ie-rates-30945

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0843/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0052/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0796/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0851/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1745.2/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/158960/Red-Hat-Security-Advisory-2020-3548-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0830/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0797/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0200/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0772/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0251/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1745/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1812/

受影响实体

暂无

信息来源

http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201911-1325

weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  0