7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
Linux kernel vulnerable to heap-based buffer overflow. The vulnerability exists in the marvell wifi chip driver in Linux kernel which allows local users to cause a denial of servic or possibly execute arbitrary code.
lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
www.openwall.com/lists/oss-security/2019/08/28/1
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.8_release_notes/index
access.redhat.com/errata/RHSA-2020:0174
access.redhat.com/errata/RHSA-2020:0328
access.redhat.com/errata/RHSA-2020:0339
access.redhat.com/errata/RHSA-2020:1016
access.redhat.com/security/cve/cve-2019-14814
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1744130
bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14814
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7caac62ed598a196d6ddf8d9c121e12e082cac3a
github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3a
lists.debian.org/debian-lts-announce/2019/09/msg00025.html
lists.debian.org/debian-lts-announce/2020/03/msg00001.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/
lists.fedoraproject.org/archives/list/[email protected]/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/
lists.fedoraproject.org/archives/list/[email protected]/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/
seclists.org/bugtraq/2019/Nov/11
security.netapp.com/advisory/ntap-20191031-0005/
usn.ubuntu.com/4157-1/
usn.ubuntu.com/4157-2/
usn.ubuntu.com/4162-1/
usn.ubuntu.com/4162-2/
usn.ubuntu.com/4163-1/
usn.ubuntu.com/4163-2/
www.openwall.com/lists/oss-security/2019/08/28/1
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C