First published: Wed Aug 21 2019(Updated: )
A vulnerability found in the Linux kernel's WMM implementation for Marvell WiFi-based hardware (mwifiex) could lead to a denial of service or allow arbitrary code execution. For this flaw to be executed, the attacker must be both local and privileged. There is no mitigation to this flaw. A patch has been provided to remediate this flaw.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1127.rt56.1093.el7 | 0:3.10.0-1127.rt56.1093.el7 |
redhat/kernel-alt | <0:4.14.0-115.17.1.el7a | 0:4.14.0-115.17.1.el7a |
redhat/kernel | <0:3.10.0-1127.el7 | 0:3.10.0-1127.el7 |
redhat/kernel-rt | <0:4.18.0-147.5.1.rt24.98.el8_1 | 0:4.18.0-147.5.1.rt24.98.el8_1 |
redhat/kernel | <0:4.18.0-147.5.1.el8_1 | 0:4.18.0-147.5.1.el8_1 |
Linux Kernel | >=4.10<4.14.146 | |
Linux Kernel | >=4.15<4.19.75 | |
Linux Kernel | >=4.20<5.2.17 | |
redhat codeready linux builder eus | =8.1 | |
redhat codeready linux builder eus | =8.2 | |
redhat codeready linux builder eus | =8.4 | |
redhat codeready linux builder eus | =8.6 | |
redhat codeready linux builder for power little endian eus | =8.1 | |
redhat codeready linux builder for power little endian eus | =8.2 | |
redhat codeready linux builder for power little endian eus | =8.4 | |
redhat codeready linux builder for power little endian eus | =8.6 | |
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux for IBM z Systems | =7_s390x | |
redhat enterprise Linux for ibm z systems eus | =8.1 | |
redhat enterprise Linux for ibm z systems eus | =8.2 | |
redhat enterprise Linux for ibm z systems eus | =8.4 | |
redhat enterprise Linux for ibm z systems eus | =8.6 | |
redhat enterprise Linux for real time | =8 | |
redhat enterprise Linux for real time for nfv | =8 | |
redhat enterprise Linux for real time for nfv tus | =8.2 | |
redhat enterprise Linux for real time for nfv tus | =8.4 | |
redhat enterprise Linux for real time for nfv tus | =8.6 | |
redhat enterprise Linux for real time tus | =8.2 | |
redhat enterprise Linux for real time tus | =8.4 | |
redhat enterprise Linux for real time tus | =8.6 | |
redhat enterprise Linux server aus | =8.2 | |
redhat enterprise Linux server aus | =8.4 | |
redhat enterprise Linux server aus | =8.6 | |
redhat enterprise Linux server tus | =8.2 | |
redhat enterprise Linux server tus | =8.4 | |
redhat enterprise Linux server tus | =8.6 | |
NetApp AltaVault | ||
netapp hci | ||
netapp solidfire | ||
NetApp SteelStore | ||
NetApp FAS/AFF Baseboard Management Controller | ||
netapp solidfire baseboard management controller firmware | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-14815 is classified as a high-severity vulnerability due to its potential to cause denial of service or arbitrary code execution.
To mitigate CVE-2019-14815, apply the appropriate kernel updates provided by Red Hat for affected versions.
CVE-2019-14815 affects various Linux kernel versions, particularly those provided by Red Hat, including kernel-rt and kernel-alt packages.
No, CVE-2019-14815 requires local and privileged access for exploitation.
There is no known workaround for CVE-2019-14815; the only solution is to apply the appropriate patches.