First published: Wed Sep 04 2019(Updated: )
An issue was discovered in the Linux kernel before 5.2.3. Out of bounds access exists in the functions ath6kl_wmi_pstream_timeout_event_rx and ath6kl_wmi_cac_event_rx in the file drivers/net/wireless/ath/ath6kl/wmi.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=3.2<3.16.74 | |
Linux Kernel | >=3.17<4.4.187 | |
Linux Kernel | >=4.5<4.9.187 | |
Linux Kernel | >=4.10<4.14.135 | |
Linux Kernel | >=4.15<4.19.61 | |
Linux Kernel | >=4.20<5.1.20 | |
Linux Kernel | >=5.2.0<5.2.3 | |
Debian Linux | =8.0 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =19.10 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15926 has a severity rating that indicates it can lead to out of bounds access, potentially impacting system stability.
To fix CVE-2019-15926, update the Linux kernel to version 5.2.3 or later.
CVE-2019-15926 affects the Linux kernel versions from 3.2 to 5.2.2.
CVE-2019-15926 may allow for remote exploitation if the affected kernel is running on a device accessible from the network.
Systems running various distributions of the Linux kernel within the specified version range are vulnerable to CVE-2019-15926.