Vulnerability Description
There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 3.6, < 3.16.74 |
| Redhat | Virtualization | 4.0 |
| Redhat | Enterprise Linux | 5.0 |
| Redhat | Enterprise Linux Compute Node Eus | 7.6 |
| Redhat | Enterprise Linux Eus | 7.6 |
| Redhat | Enterprise Linux For Power Big Endian Eus | 7.6_ppc64 |
| Redhat | Enterprise Linux For Real Time | 7 |
| Redhat | Enterprise Linux For Real Time For Nfv | 7 |
| Redhat | Enterprise Linux For Real Time For Nfv Tus | 8.2 |
| Redhat | Enterprise Linux For Real Time Tus | 8.2 |
| Redhat | Enterprise Linux Server | 7.6 |
| Redhat | Enterprise Linux Server Aus | 7.2 |
| Redhat | Enterprise Linux Server Tus | 7.3 |
| Redhat | Enterprise Linux Tus | 7.7 |
| Redhat | Messaging Realtime Grid | 2.0 |
| Debian | Debian Linux | 8.0 |
| Fedoraproject | Fedora | 29 |
| Netapp | Data Availability Services | - |
| Netapp | Hci Management Node | - |
| Netapp | Service Processor | - |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.htmlMailing ListThird Party Advisory
- http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-SlackwarThird Party AdvisoryVDB Entry
- http://www.openwall.com/lists/oss-security/2019/08/28/1ExploitMailing ListPatch
- https://access.redhat.com/errata/RHSA-2020:0174Third Party Advisory
- https://access.redhat.com/errata/RHSA-2020:0204Third Party Advisory
- https://access.redhat.com/errata/RHSA-2020:0328Third Party Advisory
- https://access.redhat.com/errata/RHSA-2020:0339Third Party Advisory
- https://access.redhat.com/errata/RHSA-2020:0374Third Party Advisory
- https://access.redhat.com/errata/RHSA-2020:0375Third Party Advisory
- https://access.redhat.com/errata/RHSA-2020:0653Third Party Advisory
- https://access.redhat.com/errata/RHSA-2020:0661Third Party Advisory
- https://access.redhat.com/errata/RHSA-2020:0664Third Party Advisory
- https://access.redhat.com/security/cve/cve-2019-14816Third Party Advisory
FAQ
What is CVE-2019-14816?
CVE-2019-14816 is a vulnerability with a CVSS score of 7.8 (HIGH). There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or...
How severe is CVE-2019-14816?
CVE-2019-14816 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-14816?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Redhat Virtualization, Redhat Enterprise Linux, Redhat Enterprise Linux Compute Node Eus, Redhat Enterprise Linux Eus.