CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
15.7%
There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.
Vendor | Product | Version | CPE |
---|---|---|---|
linux | linux_kernel | * | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
redhat | virtualization | 4.0 | cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:* |
redhat | enterprise_linux | 5.0 | cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:* |
redhat | enterprise_linux | 6.0 | cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* |
redhat | enterprise_linux | 6.4 | cpe:2.3:o:redhat:enterprise_linux:6.4:*:*:*:*:*:*:* |
redhat | enterprise_linux | 7.0 | cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* |
redhat | enterprise_linux | 7.6 | cpe:2.3:o:redhat:enterprise_linux:7.6:*:*:*:*:*:*:* |
redhat | enterprise_linux | 8.0 | cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* |
redhat | enterprise_linux_compute_node_eus | 7.6 | cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.6:*:*:*:*:*:*:* |
redhat | enterprise_linux_eus | 7.6 | cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:* |
lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
www.openwall.com/lists/oss-security/2019/08/28/1
access.redhat.com/errata/RHSA-2020:0174
access.redhat.com/errata/RHSA-2020:0204
access.redhat.com/errata/RHSA-2020:0328
access.redhat.com/errata/RHSA-2020:0339
access.redhat.com/errata/RHSA-2020:0374
access.redhat.com/errata/RHSA-2020:0375
access.redhat.com/errata/RHSA-2020:0653
access.redhat.com/errata/RHSA-2020:0661
access.redhat.com/errata/RHSA-2020:0664
access.redhat.com/security/cve/cve-2019-14816
bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14816
github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3
lists.debian.org/debian-lts-announce/2019/09/msg00025.html
lists.debian.org/debian-lts-announce/2020/03/msg00001.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/
seclists.org/bugtraq/2019/Nov/11
security.netapp.com/advisory/ntap-20191031-0005/
usn.ubuntu.com/4157-1/
usn.ubuntu.com/4157-2/
usn.ubuntu.com/4162-1/
usn.ubuntu.com/4162-2/
usn.ubuntu.com/4163-1/
usn.ubuntu.com/4163-2/
www.openwall.com/lists/oss-security/2019/08/28/1
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
15.7%