First published: Fri May 31 2019(Updated: )
A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1062.4.1.rt56.1027.el7 | 0:3.10.0-1062.4.1.rt56.1027.el7 |
redhat/kernel | <0:3.10.0-1062.4.1.el7 | 0:3.10.0-1062.4.1.el7 |
redhat/kernel-alt | <0:4.14.0-115.17.1.el7a | 0:4.14.0-115.17.1.el7a |
redhat/kernel | <0:3.10.0-957.54.1.el7 | 0:3.10.0-957.54.1.el7 |
redhat/kernel-rt | <0:4.18.0-147.rt24.93.el8 | 0:4.18.0-147.rt24.93.el8 |
redhat/kernel | <0:4.18.0-147.el8 | 0:4.18.0-147.el8 |
redhat/kernel | <0:4.18.0-80.15.1.el8_0 | 0:4.18.0-80.15.1.el8_0 |
ubuntu/linux | <4.15.0-58.64 | 4.15.0-58.64 |
ubuntu/linux | <5.0.0-25.26 | 5.0.0-25.26 |
ubuntu/linux | <5.2~ | 5.2~ |
ubuntu/linux | <4.4.0-159.187 | 4.4.0-159.187 |
ubuntu/linux-aws | <4.15.0-1047.49 | 4.15.0-1047.49 |
ubuntu/linux-aws | <5.0.0-1014.16 | 5.0.0-1014.16 |
ubuntu/linux-aws | <4.4.0-1054.58 | 4.4.0-1054.58 |
ubuntu/linux-aws | <5.2~ | 5.2~ |
ubuntu/linux-aws | <4.4.0-1090.101 | 4.4.0-1090.101 |
ubuntu/linux-aws-5.0 | <5.2~ | 5.2~ |
ubuntu/linux-aws-hwe | <5.2~ | 5.2~ |
ubuntu/linux-aws-hwe | <4.15.0-1047.49~16.04.1 | 4.15.0-1047.49~16.04.1 |
ubuntu/linux-azure | <5.2~ | 5.2~ |
ubuntu/linux-azure-5.3 | <5.2~ | 5.2~ |
ubuntu/linux-azure-edge | <5.2~ | 5.2~ |
ubuntu/linux-euclid | <5.2~ | 5.2~ |
ubuntu/linux-flo | <5.2~ | 5.2~ |
ubuntu/linux-gcp | <4.15.0-1040.42 | 4.15.0-1040.42 |
ubuntu/linux-gcp | <5.0.0-1013.13 | 5.0.0-1013.13 |
ubuntu/linux-gcp | <5.2~ | 5.2~ |
ubuntu/linux-gcp | <4.15.0-1040.42~16.04.1 | 4.15.0-1040.42~16.04.1 |
ubuntu/linux-gcp-5.3 | <5.2~ | 5.2~ |
ubuntu/linux-gcp-edge | <4.15.0-1040.42 | 4.15.0-1040.42 |
ubuntu/linux-gcp-edge | <5.2~ | 5.2~ |
ubuntu/linux-gke | <5.2~ | 5.2~ |
ubuntu/linux-gke-4.15 | <4.15.0-1040.42 | 4.15.0-1040.42 |
ubuntu/linux-gke-4.15 | <5.2~ | 5.2~ |
ubuntu/linux-gke-5.0 | <5.2~ | 5.2~ |
ubuntu/linux-goldfish | <5.2~ | 5.2~ |
ubuntu/linux-grouper | <5.2~ | 5.2~ |
ubuntu/linux-hwe | <5.0.0-25.26~18.04.1 | 5.0.0-25.26~18.04.1 |
ubuntu/linux-hwe | <5.2~ | 5.2~ |
ubuntu/linux-hwe | <4.15.0-58.64~16.04.1 | 4.15.0-58.64~16.04.1 |
ubuntu/linux-hwe-edge | <5.2~ | 5.2~ |
ubuntu/linux-hwe-edge | <4.15.0-58.64~16.04.1 | 4.15.0-58.64~16.04.1 |
ubuntu/linux-kvm | <5.2~ | 5.2~ |
ubuntu/linux-lts-trusty | <5.2~ | 5.2~ |
ubuntu/linux-lts-utopic | <5.2~ | 5.2~ |
ubuntu/linux-lts-vivid | <5.2~ | 5.2~ |
ubuntu/linux-lts-wily | <5.2~ | 5.2~ |
ubuntu/linux-lts-xenial | <4.4.0-164.192~14.04.1 | 4.4.0-164.192~14.04.1 |
ubuntu/linux-lts-xenial | <5.2~ | 5.2~ |
ubuntu/linux-maguro | <5.2~ | 5.2~ |
ubuntu/linux-mako | <5.2~ | 5.2~ |
ubuntu/linux-manta | <5.2~ | 5.2~ |
ubuntu/linux-oem | <4.15.0-1050.57 | 4.15.0-1050.57 |
ubuntu/linux-oem | <4.15.0-1050.57 | 4.15.0-1050.57 |
ubuntu/linux-oem | <4.15.0-1050.57 | 4.15.0-1050.57 |
ubuntu/linux-oem | <5.2~ | 5.2~ |
ubuntu/linux-oem-5.4 | <5.2~ | 5.2~ |
ubuntu/linux-oem-osp1 | <5.0.0-1018.20 | 5.0.0-1018.20 |
ubuntu/linux-oem-osp1 | <5.0.0-1018.20 | 5.0.0-1018.20 |
ubuntu/linux-oem-osp1 | <5.2~ | 5.2~ |
ubuntu/linux-oracle | <4.15.0-1021.23 | 4.15.0-1021.23 |
ubuntu/linux-oracle | <5.0.0-1004.8 | 5.0.0-1004.8 |
ubuntu/linux-oracle | <5.2~ | 5.2~ |
ubuntu/linux-oracle | <4.15.0-1021.23~16.04.1 | 4.15.0-1021.23~16.04.1 |
ubuntu/linux-oracle-5.0 | <5.2~ | 5.2~ |
ubuntu/linux-raspi2 | <4.15.0-1043.46 | 4.15.0-1043.46 |
ubuntu/linux-raspi2 | <5.0.0-1014.14 | 5.0.0-1014.14 |
ubuntu/linux-raspi2 | <5.2~ | 5.2~ |
ubuntu/linux-raspi2 | <4.4.0-1118.127 | 4.4.0-1118.127 |
ubuntu/linux-raspi2-5.3 | <5.2~ | 5.2~ |
ubuntu/linux-snapdragon | <4.15.0-1060.66 | 4.15.0-1060.66 |
ubuntu/linux-snapdragon | <5.0.0-1018.19 | 5.0.0-1018.19 |
ubuntu/linux-snapdragon | <5.2~ | 5.2~ |
ubuntu/linux-snapdragon | <4.4.0-1122.128 | 4.4.0-1122.128 |
Linux Linux kernel | >=4.2<4.4.186 | |
Linux Linux kernel | >=4.5<4.9.186 | |
Linux Linux kernel | >=4.10<4.14.134 | |
Linux Linux kernel | >=4.15<4.19.59 | |
Linux Linux kernel | >=4.20<5.1.18 | |
Redhat Virtualization | =4.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux Aus | =8.2 | |
Redhat Enterprise Linux Aus | =8.4 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Eus | =7.7 | |
Redhat Enterprise Linux Eus | =8.1 | |
Redhat Enterprise Linux Eus | =8.2 | |
Redhat Enterprise Linux Eus | =8.4 | |
Redhat Enterprise Linux For Real Time | =7 | |
Redhat Enterprise Linux For Real Time | =8 | |
Redhat Enterprise Linux For Real Time For Nfv | =7 | |
Redhat Enterprise Linux For Real Time For Nfv Tus | =8.2 | |
Redhat Enterprise Linux For Real Time For Nfv Tus | =8.4 | |
Redhat Enterprise Linux For Real Time Tus | =8.2 | |
Redhat Enterprise Linux For Real Time Tus | =8.4 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server | =8.0 | |
Redhat Enterprise Linux Server Aus | =7.7 | |
Redhat Enterprise Linux Server Tus | =7.7 | |
Redhat Enterprise Linux Server Tus | =8.2 | |
Redhat Enterprise Linux Server Tus | =8.4 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.04 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
Netapp Active Iq Unified Manager Vmware Vsphere | >=9.5 | |
Netapp Hci Management Node | ||
Netapp Solidfire | ||
All of | ||
Netapp A700s Firmware | ||
Netapp A700s | ||
All of | ||
Netapp Cn1610 Firmware | ||
Netapp Cn1610 | ||
All of | ||
Netapp H610s Firmware | ||
Netapp H610s | ||
Netapp A700s Firmware | ||
Netapp A700s | ||
Netapp Cn1610 Firmware | ||
Netapp Cn1610 | ||
Netapp H610s Firmware | ||
Netapp H610s | ||
debian/linux | 4.19.249-2 4.19.304-1 5.10.209-2 5.10.205-2 6.1.76-1 6.1.85-1 6.6.15-2 6.7.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)