642
VMScore

CVE-2019-14814

Published: 20/09/2019 Updated: 28/09/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 642
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

It exists that a race condition existed in the ARC EMAC ethernet driver for the Linux kernel, resulting in a use-after-free vulnerability. An attacker could use this to cause a denial of service (system crash). (CVE-2016-10906)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

redhat enterprise linux 7.0

redhat enterprise linux 6.0

redhat enterprise linux 5.0

redhat enterprise linux 8.0

redhat messaging realtime grid 2.0

redhat enterprise linux eus 8.1

redhat enterprise linux eus 8.2

redhat enterprise linux server tus 8.2

redhat enterprise linux server aus 8.2

redhat enterprise linux for real time 8

redhat enterprise linux server tus 8.4

redhat enterprise linux eus 8.4

redhat enterprise linux for real time for nfv tus 8.4

redhat enterprise linux for real time for nfv tus 8.2

redhat enterprise linux for real time tus 8.4

redhat enterprise linux for real time tus 8.2

redhat enterprise linux server aus 8.4

redhat enterprise linux for real time for nfv 8

debian debian linux 8.0

canonical ubuntu linux 18.04

canonical ubuntu linux 19.04

canonical ubuntu linux 14.04

canonical ubuntu linux 16.04

opensuse leap 15.0

opensuse leap 15.1

netapp steelstore cloud integrated storage -

netapp service processor -

netapp data availability services -

netapp solidfire -

netapp hci management node -

netapp a700s firmware -

netapp a320 firmware -

netapp c190 firmware -

netapp a220 firmware -

netapp fas2720 firmware -

netapp fas2750 firmware -

netapp a800 firmware -

netapp h300s firmware -

netapp h500s firmware -

netapp h700s firmware -

netapp h300e firmware -

netapp h500e firmware -

netapp h700e firmware -

netapp h410s firmware -

netapp h410c firmware -

netapp h610s firmware -

Vendor Advisories

Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) b ...
Synopsis Important: kernel-alt security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel-alt is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System ...
Synopsis Important: kernel-rt security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel-rt is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (C ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...

Mailing Lists

Hi, There are three heap-based buffer overflows in marvell wifi chip driver in Linux kernel, allow local users to cause a denial of service(system crash) or possibly execute arbitrary codeThe bugs can be triggered by sending crafted packet via netlink Description ========== [1]CVE-2019-14814:Heap Overflow in mwifiex_set_uap_rates() functio ...

References

CWE-122https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14814https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3ahttps://access.redhat.com/security/cve/cve-2019-14814https://www.openwall.com/lists/oss-security/2019/08/28/1http://www.openwall.com/lists/oss-security/2019/08/28/1http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.htmlhttps://lists.debian.org/debian-lts-announce/2019/09/msg00025.htmlhttps://usn.ubuntu.com/4157-1/https://usn.ubuntu.com/4157-2/https://usn.ubuntu.com/4162-1/https://usn.ubuntu.com/4163-1/https://usn.ubuntu.com/4163-2/https://usn.ubuntu.com/4162-2/http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.htmlhttps://security.netapp.com/advisory/ntap-20191031-0005/https://seclists.org/bugtraq/2019/Nov/11http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.htmlhttps://access.redhat.com/errata/RHSA-2020:0174https://access.redhat.com/errata/RHSA-2020:0328https://access.redhat.com/errata/RHSA-2020:0339https://lists.debian.org/debian-lts-announce/2020/03/msg00001.htmlhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/https://nvd.nist.govhttps://access.redhat.com/errata/RHSA-2020:0339https://usn.ubuntu.com/4163-1/