CVE-2019-16234
kernel: null pointer dereference in drivers/net/wireless/intel/iwlwifi/pcie/trans.c
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
El archivo drivers/net/wireless/intel/iwlwifi/pcie/trans.c en el kernel de Linux versiĆ³n 5.2.14, no comprueba el valor de retorno en alloc_workqueue, conllevando a una desreferencia del puntero NULL.
A flaw was found in the Linux kernel. A check was not done on the alloc_workqueue return value of the iwl_trans_pcie_alloc function potentially leading to a NULL pointer dereference. This error condition could lead to a denial of service. The highest threat from this vulnerability is to system availability.
Al Viro discovered that the Linux kernel for s390x systems did not properly perform page table upgrades for kernel sections that use secondary address mode. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that the Intel Wi-Fi driver in the Linux kernel did not properly check for errors in some situations. A local attacker could possibly use this to cause a denial of service. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-09-11 CVE Reserved
- 2019-09-11 CVE Published
- 2024-08-05 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-476: NULL Pointer Dereference
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
https://security.netapp.com/advisory/ntap-20191004-0001 | Third Party Advisory |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://lkml.org/lkml/2019/9/9/487 | 2020-05-05 |
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html | 2020-05-05 | |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html | 2020-05-05 | |
https://usn.ubuntu.com/4342-1 | 2020-05-05 | |
https://usn.ubuntu.com/4344-1 | 2020-05-05 | |
https://usn.ubuntu.com/4345-1 | 2020-05-05 | |
https://usn.ubuntu.com/4346-1 | 2020-05-05 | |
https://access.redhat.com/security/cve/CVE-2019-16234 | 2020-04-28 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1760441 | 2020-04-28 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 5.2.14 Search vendor "Linux" for product "Linux Kernel" and version "5.2.14" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 16.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 18.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "18.04" | lts |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Leap Search vendor "Opensuse" for product "Leap" | 15.0 Search vendor "Opensuse" for product "Leap" and version "15.0" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Leap Search vendor "Opensuse" for product "Leap" | 15.1 Search vendor "Opensuse" for product "Leap" and version "15.1" | - |
Affected
|