← Retour aux CVEs
CVE-2019-14814
HIGH7.8
Description
There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.
Details CVE
Score CVSS v3.17.8
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueLOCAL
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurNONE
Publie9/20/2019
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
canonical:ubuntu_linuxdebian:debian_linuxlinux:linux_kernelnetapp:a220netapp:a220_firmwarenetapp:a320netapp:a320_firmwarenetapp:a700snetapp:a700s_firmwarenetapp:a800netapp:a800_firmwarenetapp:c190netapp:c190_firmwarenetapp:data_availability_servicesnetapp:fas2720netapp:fas2720_firmwarenetapp:fas2750netapp:fas2750_firmwarenetapp:h300enetapp:h300e_firmwarenetapp:h300snetapp:h300s_firmwarenetapp:h410cnetapp:h410c_firmwarenetapp:h410snetapp:h410s_firmwarenetapp:h500enetapp:h500e_firmwarenetapp:h500snetapp:h500s_firmwarenetapp:h610snetapp:h610s_firmwarenetapp:h700enetapp:h700e_firmwarenetapp:h700snetapp:h700s_firmwarenetapp:hci_management_nodenetapp:service_processornetapp:solidfirenetapp:steelstore_cloud_integrated_storageopensuse:leapredhat:enterprise_linuxredhat:enterprise_linux_eusredhat:enterprise_linux_for_real_timeredhat:enterprise_linux_for_real_time_for_nfvredhat:enterprise_linux_for_real_time_for_nfv_tusredhat:enterprise_linux_for_real_time_tusredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:messaging_realtime_grid
Faiblesses (CWE)
CWE-122CWE-787
References
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html(secalert@redhat.com)
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html(secalert@redhat.com)
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2019/08/28/1(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2020:0174(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2020:0328(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2020:0339(secalert@redhat.com)
https://access.redhat.com/security/cve/cve-2019-14814(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14814(secalert@redhat.com)
https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3a(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html(secalert@redhat.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/(secalert@redhat.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/(secalert@redhat.com)
https://seclists.org/bugtraq/2019/Nov/11(secalert@redhat.com)
https://security.netapp.com/advisory/ntap-20191031-0005/(secalert@redhat.com)
https://usn.ubuntu.com/4157-1/(secalert@redhat.com)
https://usn.ubuntu.com/4157-2/(secalert@redhat.com)
https://usn.ubuntu.com/4162-1/(secalert@redhat.com)
https://usn.ubuntu.com/4162-2/(secalert@redhat.com)
https://usn.ubuntu.com/4163-1/(secalert@redhat.com)
https://usn.ubuntu.com/4163-2/(secalert@redhat.com)
https://www.openwall.com/lists/oss-security/2019/08/28/1(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2019/08/28/1(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0174(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0328(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0339(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/security/cve/cve-2019-14814(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14814(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3a(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Nov/11(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20191031-0005/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4157-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4157-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4162-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4162-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4163-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4163-2/(af854a3a-2127-422b-91ae-364da2661108)
https://www.openwall.com/lists/oss-security/2019/08/28/1(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.