First published: Wed Aug 21 2019(Updated: )
A flaw was found in the Linux kernel’s implementation of the Marvell wifi driver, which can allow a local user who has CAP_NET_ADMIN or administrative privileges to possibly cause a Denial Of Service (DOS) by corrupting memory and possible code execution.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-alt | <0:4.14.0-115.17.1.el7a | 0:4.14.0-115.17.1.el7a |
redhat/kernel | <0:3.10.0-1127.el7 | 0:3.10.0-1127.el7 |
redhat/kernel-rt | <0:4.18.0-147.5.1.rt24.98.el8_1 | 0:4.18.0-147.5.1.rt24.98.el8_1 |
redhat/kernel | <0:4.18.0-147.5.1.el8_1 | 0:4.18.0-147.5.1.el8_1 |
Linux Kernel | >=3.7<3.16.74 | |
Linux Kernel | >=3.17<4.4.194 | |
Linux Kernel | >=4.5<4.9.194 | |
Linux Kernel | >=4.10<4.14.146 | |
Linux Kernel | >=4.15<4.19.75 | |
Linux Kernel | >=4.20<5.2.17 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
redhat enterprise Linux eus | =8.1 | |
redhat enterprise Linux eus | =8.2 | |
redhat enterprise Linux eus | =8.4 | |
redhat enterprise Linux for real time | =8 | |
redhat enterprise Linux for real time for nfv | =8 | |
redhat enterprise Linux for real time for nfv tus | =8.2 | |
redhat enterprise Linux for real time for nfv tus | =8.4 | |
redhat enterprise Linux for real time tus | =8.2 | |
redhat enterprise Linux for real time tus | =8.4 | |
redhat enterprise Linux server aus | =8.2 | |
redhat enterprise Linux server aus | =8.4 | |
redhat enterprise Linux server tus | =8.2 | |
redhat enterprise Linux server tus | =8.4 | |
Red Hat Messaging Realtime Grid | =2.0 | |
Debian GNU/Linux | =8.0 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =19.04 | |
openSUSE | =15.0 | |
openSUSE | =15.1 | |
netapp data availability services | ||
netapp hci management node | ||
NetApp Service Processor | ||
netapp solidfire | ||
NetApp SteelStore | ||
All of | ||
NetApp AFF A700s Firmware | ||
netapp a700s | ||
All of | ||
NetApp AFF A320 Firmware | ||
NetApp AFF A320 | ||
All of | ||
NetApp AFF C190 Firmware | ||
NetApp AFF C190 | ||
All of | ||
NetApp AFF A220 Firmware | ||
NetApp AFF A220 | ||
All of | ||
NetApp FAS2700 Firmware | ||
netapp fas2720 | ||
All of | ||
NetApp FAS2700 Firmware | ||
netapp fas2750 | ||
All of | ||
NetApp AFF A800 Firmware | ||
NetApp AFF A800 | ||
All of | ||
netapp h300s firmware | ||
netapp h300s | ||
All of | ||
NetApp H500S Firmware | ||
netapp h500s | ||
All of | ||
netapp h700s firmware | ||
netapp h700s | ||
All of | ||
netapp h300e firmware | ||
netapp h300e | ||
All of | ||
netapp h500e firmware | ||
netapp h500e | ||
All of | ||
netapp h700e firmware | ||
netapp h700e | ||
All of | ||
netapp h410s firmware | ||
netapp h410s | ||
All of | ||
netapp h410c firmware | ||
netapp h410c | ||
All of | ||
netapp h610s firmware | ||
netapp h610s | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 | |
Debian | =8.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =19.04 | |
NetApp AFF A700s Firmware | ||
netapp a700s | ||
NetApp AFF A320 Firmware | ||
NetApp AFF A320 | ||
NetApp AFF C190 Firmware | ||
NetApp AFF C190 | ||
NetApp AFF A220 Firmware | ||
NetApp AFF A220 | ||
NetApp FAS2700 Firmware | ||
netapp fas2720 | ||
NetApp FAS2700 Firmware | ||
netapp fas2750 | ||
NetApp AFF A800 Firmware | ||
NetApp AFF A800 | ||
netapp h300s firmware | ||
netapp h300s | ||
NetApp H500S Firmware | ||
netapp h500s | ||
netapp h700s firmware | ||
netapp h700s | ||
netapp h300e firmware | ||
netapp h300e | ||
netapp h500e firmware | ||
netapp h500e | ||
netapp h700e firmware | ||
netapp h700e | ||
netapp h410s firmware | ||
netapp h410s | ||
netapp h410c firmware | ||
netapp h410c | ||
netapp h610s firmware | ||
netapp h610s |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-14814 has a high severity rating as it can result in a Denial of Service (DoS) and potential code execution.
To fix CVE-2019-14814, upgrade to the kernel version 0:4.14.0-115.17.1.el7a, 0:3.10.0-1127.el7, 0:4.18.0-147.5.1.rt24.98.el8_1, or 0:4.18.0-147.5.1.el8_1.
CVE-2019-14814 affects local users on systems running vulnerable versions of the Linux kernel with the Marvell wifi driver.
CVE-2019-14814 is classified as a local privilege escalation vulnerability due to memory corruption.
No, CVE-2019-14814 can only be exploited locally by users with CAP_NET_ADMIN privileges.