{"id":"CVE-2019-14895","details":"A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.","modified":"2026-04-16T04:31:39.195256237Z","published":"2019-11-29T14:15:11.177Z","related":["SUSE-SU-2019:3200-1","SUSE-SU-2019:3289-1","SUSE-SU-2019:3316-1","SUSE-SU-2019:3317-1","SUSE-SU-2019:3371-1","SUSE-SU-2019:3372-1","SUSE-SU-2019:3379-1","SUSE-SU-2019:3381-1","SUSE-SU-2020:0093-1","SUSE-SU-2020:0599-1","SUSE-SU-2020:0613-1","SUSE-SU-2020:0667-1","SUSE-SU-2020:1255-1","SUSE-SU-2020:2491-1","SUSE-SU-2020:2492-1","SUSE-SU-2020:2497-1","SUSE-SU-2020:2498-1","SUSE-SU-2020:2505-1","SUSE-SU-2020:2506-1","SUSE-SU-2020:2513-1","SUSE-SU-2020:2526-1","openSUSE-SU-2019:2675-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0339"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0374"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0592"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0609"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4227-1/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0328"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0375"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0664"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4226-1/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0653"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4225-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4225-2/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4227-2/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4228-1/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0543"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0661"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4228-2/"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14895"},{"type":"FIX","url":"https://www.openwall.com/lists/oss-security/2019/11/22/2"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-14895.json","unresolved_ranges":[{"events":[{"introduced":"3.7"},{"fixed":"3.16.81"}]},{"events":[{"introduced":"3.17"},{"fixed":"4.4.210"}]},{"events":[{"introduced":"4.5"},{"fixed":"4.9.210"}]},{"events":[{"introduced":"4.10"},{"fixed":"4.14.165"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.19.96"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.12"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.10"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}