A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 04:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html - Mailing List, Third Party Advisory | |
References | () http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html - Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2020:0204 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0328 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0339 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0374 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0375 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14901 - Issue Tracking, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html - Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/ - | |
References | () https://usn.ubuntu.com/4225-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/4225-2/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/4226-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/4227-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/4227-2/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/4228-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/4228-2/ - Third Party Advisory |
Information
Published : 2019-11-29 15:15
Updated : 2024-11-21 04:27
NVD link : CVE-2019-14901
Mitre link : CVE-2019-14901
CVE.ORG link : CVE-2019-14901
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
canonical
- ubuntu_linux
fedoraproject
- fedora