Description
There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.
Published: 2019-09-20
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-1930-1 linux security update
Debian DLA Debian DLA DLA-2114-1 linux-4.9 security update
EUVD EUVD EUVD-2019-5945 There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.
Ubuntu USN Ubuntu USN USN-4157-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-4157-2 Linux kernel (HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-4162-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-4162-2 Linux kernel (Azure) vulnerabilities
Ubuntu USN Ubuntu USN USN-4163-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-4163-2 Linux kernel (Xenial HWE) vulnerabilities
References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html cve-icon cve-icon
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html cve-icon cve-icon
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2019/08/28/1 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2020:0174 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2020:0204 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2020:0328 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2020:0339 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2020:0374 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2020:0375 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2020:0653 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2020:0661 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2020:0664 cve-icon cve-icon
https://access.redhat.com/security/cve/cve-2019-14816 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14816 cve-icon cve-icon
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7caac62ed598a196d6ddf8d9c121e12e082cac3a cve-icon
https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3 cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2019-14816 cve-icon
https://seclists.org/bugtraq/2019/Nov/11 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20191031-0005/ cve-icon cve-icon
https://usn.ubuntu.com/4157-1/ cve-icon cve-icon
https://usn.ubuntu.com/4157-2/ cve-icon cve-icon
https://usn.ubuntu.com/4162-1/ cve-icon cve-icon
https://usn.ubuntu.com/4162-2/ cve-icon cve-icon
https://usn.ubuntu.com/4163-1/ cve-icon cve-icon
https://usn.ubuntu.com/4163-2/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2019-14816 cve-icon
https://www.openwall.com/lists/oss-security/2019/08/28/1 cve-icon cve-icon
History

No history.

Subscriptions

Canonical Ubuntu Linux
Debian Debian Linux
Fedoraproject Fedora
Linux Linux Kernel
Netapp A220 A220 Firmware A320 A320 Firmware A700s A700s Firmware A800 A800 Firmware C190 C190 Firmware Data Availability Services Fas2720 Fas2720 Firmware Fas2750 Fas2750 Firmware H300e H300e Firmware H300s H300s Firmware H410s H410s Firmware H500e H500e Firmware H500s H500s Firmware H610s H610s Firmware H700e H700e Firmware H700s H700s Firmware Hci Management Node Service Processor Solidfire Steelstore Cloud Integrated Storage
Opensuse Leap
Redhat Enterprise Linux Enterprise Linux Compute Node Eus Enterprise Linux Eus Enterprise Linux For Power Big Endian Eus Enterprise Linux For Real Time Enterprise Linux For Real Time For Nfv Enterprise Linux For Real Time For Nfv Tus Enterprise Linux For Real Time Tus Enterprise Linux Server Enterprise Linux Server Aus Enterprise Linux Server Tus Enterprise Linux Tus Enterprise Mrg Messaging Realtime Grid Rhel Aus Rhel E4s Rhel Eus Rhel Extras Rt Rhel Tus Virtualization
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-05T00:26:39.113Z

Reserved: 2019-08-10T00:00:00.000Z

Link: CVE-2019-14816

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-09-20T19:15:11.767

Modified: 2024-11-21T04:27:25.253

Link: CVE-2019-14816

cve-icon Redhat

Severity : Important

Publid Date: 2019-08-28T10:00:00Z

Links: CVE-2019-14816 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses