Heap-based Buffer Overflow Affecting kernel-rt-doc package, versions <0:3.10.0-1062.4.1.rt56.1027.el7
Threat Intelligence
EPSS
1.15% (86th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS7-KERNELRTDOC-2146769
- published 26 Jul 2021
- disclosed 31 May 2019
Introduced: 31 May 2019
CVE-2019-10126 Open this link in a new tabHow to fix?
Upgrade Centos:7
kernel-rt-doc
to version 0:3.10.0-1062.4.1.rt56.1027.el7 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-rt-doc
package and not the kernel-rt-doc
package as distributed by Centos
.
See How to fix?
for Centos:7
relevant fixed versions and status.
A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences.
References
- http://www.securityfocus.com/bid/108817
- https://seclists.org/bugtraq/2019/Jul/33
- https://seclists.org/bugtraq/2019/Jun/26
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10126
- https://security.netapp.com/advisory/ntap-20190710-0002/
- https://support.f5.com/csp/article/K95593121
- https://access.redhat.com/security/cve/CVE-2019-10126
- https://www.debian.org/security/2019/dsa-4465
- http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
- http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
- https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html
- https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html
- https://access.redhat.com/errata/RHSA-2019:3089
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html
- https://usn.ubuntu.com/4093-1/
- https://usn.ubuntu.com/4094-1/
- https://usn.ubuntu.com/4095-1/
- https://usn.ubuntu.com/4095-2/
- https://usn.ubuntu.com/4117-1/
- https://usn.ubuntu.com/4118-1/
- https://bugzilla.redhat.com/show_bug.cgi?id=1716992
CVSS Scores
version 3.1