ID

VAR-201909-1526


CVE

CVE-2019-14816


TITLE

Red Hat Security Advisory 2020-0204-01

Trust: 0.1

sources: PACKETSTORM: 156058

DESCRIPTION

There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code. 8.0) - aarch64, noarch, ppc64le, s390x, x86_64 3. Bug Fix(es): * Backport TCP follow-up for small buffers (BZ#1739184) * TCP performance regression after CVE-2019-11478 bug fix (BZ#1743170) * RHEL8.0 - bnx2x link down, caused by transmit timeouts during load test (Marvell/Cavium/QLogic) (L3:) (BZ#1743548) * block: blk-mq improvement (BZ#1780567) * RHEL8.0 - Regression to RHEL7.6 by changing force_latency found during RHEL8.0 validation for SAP HANA on POWER (BZ#1781111) * blk-mq: overwirte performance drops on real MQ device (BZ#1782183) * RHEL8: creating vport takes lot of memory i.e 2GB per vport which leads to drain out system memory quickly. (BZ#1782705) 4. Bugs fixed (https://bugzilla.redhat.com/): 1646768 - CVE-2018-12207 hw: Machine Check Error on Page Size Change (IFU) 1660375 - CVE-2018-16884 kernel: nfs: use-after-free in svc_process_common() 1664110 - CVE-2019-5489 Kernel: page cache side channel attacks 1698757 - CVE-2019-3900 Kernel: vhost_net: infinite loop while receiving packets leads to DoS 1716992 - CVE-2019-10126 kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c 1724393 - CVE-2019-0154 hw: Intel GPU Denial Of Service while accessing MMIO in lower power state 1724398 - CVE-2019-0155 hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write 1727857 - CVE-2019-9506 hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) 1744149 - CVE-2019-14816 kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver 1746708 - CVE-2019-14821 Kernel: KVM: OOB memory access via mmio ring buffer 1753062 - CVE-2019-11135 hw: TSX Transaction Asynchronous Abort (TAA) 1773519 - CVE-2019-14901 kernel: heap overflow in marvell/mwifiex/tdls.c 6. Bug Fix(es): * Slow console output with ast (Aspeed) graphics driver (BZ#1780145) * core: backports from upstream (BZ#1794373) * System Crash on vport creation (NPIV on FCoE) (BZ#1796362) * [GSS] Can't access the mount point due to possible blocking of i/o on rbd (BZ#1796432) 4. ========================================================================== Kernel Live Patch Security Notice 0058-1 October 22, 2019 linux vulnerability ========================================================================== A security issue affects these releases of Ubuntu: | Series | Base kernel | Arch | flavors | |------------------+--------------+----------+------------------| | Ubuntu 18.04 LTS | 4.15.0 | amd64 | aws | | Ubuntu 18.04 LTS | 4.15.0 | amd64 | generic | | Ubuntu 18.04 LTS | 4.15.0 | amd64 | lowlatency | | Ubuntu 18.04 LTS | 4.15.0 | amd64 | oem | | Ubuntu 18.04 LTS | 5.0.0 | amd64 | azure | | Ubuntu 14.04 LTS | 4.4.0 | amd64 | generic | | Ubuntu 14.04 LTS | 4.4.0 | amd64 | lowlatency | | Ubuntu 16.04 LTS | 4.4.0 | amd64 | aws | | Ubuntu 16.04 LTS | 4.4.0 | amd64 | generic | | Ubuntu 16.04 LTS | 4.4.0 | amd64 | lowlatency | | Ubuntu 16.04 LTS | 4.15.0 | amd64 | azure | | Ubuntu 16.04 LTS | 4.15.0 | amd64 | generic | | Ubuntu 16.04 LTS | 4.15.0 | amd64 | lowlatency | Summary: Several security issues were fixed in the kernel. Software Description: - linux: Linux kernel Details: It was discovered that a race condition existed in the GFS2 file system in the Linux kernel. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2016-10905) It was discovered that a use-after-free error existed in the block layer subsystem of the Linux kernel when certain failure conditions occurred. (CVE-2018-20856) It was discovered that the USB gadget Midi driver in the Linux kernel contained a double-free vulnerability when handling certain error conditions. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-20961) It was discovered that the XFS file system in the Linux kernel did not properly handle mount failures in some situations. (CVE-2018-20976) It was discovered that the RSI 91x Wi-Fi driver in the Linux kernel did not did not handle detach operations correctly, leading to a use-after-free vulnerability. (CVE-2018-21008) It was discovered that the Intel Wi-Fi device driver in the Linux kernel did not properly validate certain Tunneled Direct Link Setup (TDLS). A physically proximate attacker could use this to cause a denial of service (Wi-Fi disconnect). (CVE-2019-0136) It was discovered that the Linux kernel on ARM processors allowed a tracing process to modify a syscall after a seccomp decision had been made on that syscall. A local attacker could possibly use this to bypass seccomp restrictions. (CVE-2019-2054) It was discovered that an integer overflow existed in the Binder implementation of the Linux kernel, leading to a buffer overflow. A local attacker could use this to escalate privileges. (CVE-2019-2181) It was discovered that the Marvell Wireless LAN device driver in the Linux kernel did not properly validate the BSS descriptor. (CVE-2019-3846) It was discovered that a heap buffer overflow existed in the Marvell Wireless LAN device driver for the Linux kernel. (CVE-2019-10126) It was discovered that the Bluetooth UART implementation in the Linux kernel did not properly check for missing tty operations. A local attacker could use this to cause a denial of service. (CVE-2019-10207) Jonathan Looney discovered that an integer overflow existed in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service (system crash). (CVE-2019-11477) Jonathan Looney discovered that the TCP retransmission queue implementation in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (CVE-2019-11478) It was discovered that the ext4 file system implementation in the Linux kernel did not properly zero out memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2019-11833) It was discovered that the PowerPC dlpar implementation in the Linux kernel did not properly check for allocation errors in some situations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2019-12614) It was discovered that the floppy driver in the Linux kernel did not properly validate meta data, leading to a buffer overread. A local attacker could use this to cause a denial of service (system crash). (CVE-2019-14283) It was discovered that the floppy driver in the Linux kernel did not properly validate ioctl() calls, leading to a division-by-zero. A local attacker could use this to cause a denial of service (system crash). (CVE-2019-14284) Wen Huang discovered that the Marvell Wi-Fi device driver in the Linux kernel did not properly perform bounds checking, leading to a heap overflow. (CVE-2019-14814) Wen Huang discovered that the Marvell Wi-Fi device driver in the Linux kernel did not properly perform bounds checking, leading to a heap overflow. (CVE-2019-14815) Wen Huang discovered that the Marvell Wi-Fi device driver in the Linux kernel did not properly perform bounds checking, leading to a heap overflow. (CVE-2019-14816) Matt Delco discovered that the KVM hypervisor implementation in the Linux kernel did not properly perform bounds checking when handling coalesced MMIO write operations. A local attacker with write access to /dev/kvm could use this to cause a denial of service (system crash). (CVE-2019-14821) Peter Pi discovered a buffer overflow in the virtio network backend (vhost_net) implementation in the Linux kernel. (CVE-2019-14835) Update instructions: The problem can be corrected by updating your livepatches to the following versions: | Kernel | Version | flavors | |--------------------------+----------+--------------------------| | 4.4.0-148.174 | 58.1 | lowlatency, generic | | 4.4.0-148.174~14.04.1 | 58.1 | lowlatency, generic | | 4.4.0-150.176 | 58.1 | generic, lowlatency | | 4.4.0-150.176~14.04.1 | 58.1 | lowlatency, generic | | 4.4.0-151.178 | 58.1 | lowlatency, generic | | 4.4.0-151.178~14.04.1 | 58.1 | generic, lowlatency | | 4.4.0-154.181 | 58.1 | lowlatency, generic | | 4.4.0-154.181~14.04.1 | 58.1 | generic, lowlatency | | 4.4.0-157.185 | 58.1 | lowlatency, generic | | 4.4.0-157.185~14.04.1 | 58.1 | generic, lowlatency | | 4.4.0-159.187 | 58.1 | lowlatency, generic | | 4.4.0-159.187~14.04.1 | 58.1 | generic, lowlatency | | 4.4.0-161.189 | 58.1 | lowlatency, generic | | 4.4.0-161.189~14.04.1 | 58.1 | lowlatency, generic | | 4.4.0-164.192 | 58.1 | lowlatency, generic | | 4.4.0-164.192~14.04.1 | 58.1 | lowlatency, generic | | 4.4.0-165.193 | 58.1 | generic, lowlatency | | 4.4.0-1083.93 | 58.1 | aws | | 4.4.0-1084.94 | 58.1 | aws | | 4.4.0-1085.96 | 58.1 | aws | | 4.4.0-1087.98 | 58.1 | aws | | 4.4.0-1088.99 | 58.1 | aws | | 4.4.0-1090.101 | 58.1 | aws | | 4.4.0-1092.103 | 58.1 | aws | | 4.4.0-1094.105 | 58.1 | aws | | 4.15.0-50.54 | 58.1 | generic, lowlatency | | 4.15.0-50.54~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-51.55 | 58.1 | generic, lowlatency | | 4.15.0-51.55~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-52.56 | 58.1 | lowlatency, generic | | 4.15.0-52.56~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-54.58 | 58.1 | generic, lowlatency | | 4.15.0-54.58~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-55.60 | 58.1 | generic, lowlatency | | 4.15.0-58.64 | 58.1 | generic, lowlatency | | 4.15.0-58.64~16.04.1 | 58.1 | lowlatency, generic | | 4.15.0-60.67 | 58.1 | lowlatency, generic | | 4.15.0-60.67~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-62.69 | 58.1 | generic, lowlatency | | 4.15.0-62.69~16.04.1 | 58.1 | lowlatency, generic | | 4.15.0-64.73 | 58.1 | generic, lowlatency | | 4.15.0-64.73~16.04.1 | 58.1 | lowlatency, generic | | 4.15.0-65.74 | 58.1 | lowlatency, generic | | 4.15.0-1038.43 | 58.1 | oem | | 4.15.0-1039.41 | 58.1 | aws | | 4.15.0-1039.44 | 58.1 | oem | | 4.15.0-1040.42 | 58.1 | aws | | 4.15.0-1041.43 | 58.1 | aws | | 4.15.0-1043.45 | 58.1 | aws | | 4.15.0-1043.48 | 58.1 | oem | | 4.15.0-1044.46 | 58.1 | aws | | 4.15.0-1045.47 | 58.1 | aws | | 4.15.0-1045.50 | 58.1 | oem | | 4.15.0-1047.49 | 58.1 | aws | | 4.15.0-1047.51 | 58.1 | azure | | 4.15.0-1048.50 | 58.1 | aws | | 4.15.0-1049.54 | 58.1 | azure | | 4.15.0-1050.52 | 58.1 | aws | | 4.15.0-1050.55 | 58.1 | azure | | 4.15.0-1050.57 | 58.1 | oem | | 4.15.0-1051.53 | 58.1 | aws | | 4.15.0-1051.56 | 58.1 | azure | | 4.15.0-1052.57 | 58.1 | azure | | 4.15.0-1055.60 | 58.1 | azure | | 4.15.0-1056.61 | 58.1 | azure | | 4.15.0-1056.65 | 58.1 | oem | | 4.15.0-1057.62 | 58.1 | azure | | 4.15.0-1057.66 | 58.1 | oem | | 4.15.0-1059.64 | 58.1 | azure | | 5.0.0-1014.14~18.04.1 | 58.1 | azure | | 5.0.0-1016.17~18.04.1 | 58.1 | azure | | 5.0.0-1018.19~18.04.1 | 58.1 | azure | | 5.0.0-1020.21~18.04.1 | 58.1 | azure | Support Information: Kernels older than the levels listed below do not receive livepatch updates. Please upgrade your kernel as soon as possible. | Series | Version | Flavors | |------------------+------------------+--------------------------| | Ubuntu 18.04 LTS | 4.15.0-1039 | aws | | Ubuntu 16.04 LTS | 4.4.0-1083 | aws | | Ubuntu 18.04 LTS | 5.0.0-1000 | azure | | Ubuntu 16.04 LTS | 4.15.0-1047 | azure | | Ubuntu 18.04 LTS | 4.15.0-50 | generic lowlatency | | Ubuntu 16.04 LTS | 4.15.0-50 | generic lowlatency | | Ubuntu 14.04 LTS | 4.4.0-148 | generic lowlatency | | Ubuntu 18.04 LTS | 4.15.0-1038 | oem | | Ubuntu 16.04 LTS | 4.4.0-148 | generic lowlatency | References: CVE-2016-10905, CVE-2018-20856, CVE-2018-20961, CVE-2018-20976, CVE-2018-21008, CVE-2019-0136, CVE-2019-2054, CVE-2019-2181, CVE-2019-3846, CVE-2019-10126, CVE-2019-10207, CVE-2019-11477, CVE-2019-11478, CVE-2019-11833, CVE-2019-12614, CVE-2019-14283, CVE-2019-14284, CVE-2019-14814, CVE-2019-14815, CVE-2019-14816, CVE-2019-14821, CVE-2019-14835 -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce . 7.2) - x86_64 3. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu 14.04 ESM. (CVE-2019-15902) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 ESM: linux-image-4.4.0-1056-aws 4.4.0-1056.60 linux-image-4.4.0-166-generic 4.4.0-166.195~14.04.1 linux-image-4.4.0-166-generic-lpae 4.4.0-166.195~14.04.1 linux-image-4.4.0-166-lowlatency 4.4.0-166.195~14.04.1 linux-image-4.4.0-166-powerpc-e500mc 4.4.0-166.195~14.04.1 linux-image-4.4.0-166-powerpc-smp 4.4.0-166.195~14.04.1 linux-image-4.4.0-166-powerpc64-emb 4.4.0-166.195~14.04.1 linux-image-4.4.0-166-powerpc64-smp 4.4.0-166.195~14.04.1 linux-image-aws 4.4.0.1056.57 linux-image-generic-lpae-lts-xenial 4.4.0.166.145 linux-image-generic-lts-xenial 4.4.0.166.145 linux-image-lowlatency-lts-xenial 4.4.0.166.145 linux-image-powerpc-e500mc-lts-xenial 4.4.0.166.145 linux-image-powerpc-smp-lts-xenial 4.4.0.166.145 linux-image-powerpc64-emb-lts-xenial 4.4.0.166.145 linux-image-powerpc64-smp-lts-xenial 4.4.0.166.145 linux-image-virtual-lts-xenial 4.4.0.166.145 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. Please note that the RDS protocol is blacklisted in Ubuntu by default. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2020:1347-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:1347 Issue date: 2020-04-07 CVE Names: CVE-2019-14816 CVE-2019-17666 ==================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 7.4) - noarch, x86_64 Red Hat Enterprise Linux Server E4S (v. 7.4) - noarch, ppc64le, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server Optional E4S (v. 7.4) - ppc64le, x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.4) - noarch, x86_64 3. Bug Fix(es): * [xfstests]: copy_file_range cause corruption on rhel-7 (BZ#1797965) * port show-kabi to python3 (BZ#1806926) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Package List: Red Hat Enterprise Linux Server AUS (v. 7.4): Source: kernel-3.10.0-693.65.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-693.65.1.el7.noarch.rpm kernel-doc-3.10.0-693.65.1.el7.noarch.rpm x86_64: kernel-3.10.0-693.65.1.el7.x86_64.rpm kernel-debug-3.10.0-693.65.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-693.65.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.65.1.el7.x86_64.rpm kernel-devel-3.10.0-693.65.1.el7.x86_64.rpm kernel-headers-3.10.0-693.65.1.el7.x86_64.rpm kernel-tools-3.10.0-693.65.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-693.65.1.el7.x86_64.rpm perf-3.10.0-693.65.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm python-perf-3.10.0-693.65.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm Red Hat Enterprise Linux Server E4S (v. 7.4): Source: kernel-3.10.0-693.65.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-693.65.1.el7.noarch.rpm kernel-doc-3.10.0-693.65.1.el7.noarch.rpm ppc64le: kernel-3.10.0-693.65.1.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-693.65.1.el7.ppc64le.rpm kernel-debug-3.10.0-693.65.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-693.65.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-693.65.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-693.65.1.el7.ppc64le.rpm kernel-devel-3.10.0-693.65.1.el7.ppc64le.rpm kernel-headers-3.10.0-693.65.1.el7.ppc64le.rpm kernel-tools-3.10.0-693.65.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-693.65.1.el7.ppc64le.rpm kernel-tools-libs-3.10.0-693.65.1.el7.ppc64le.rpm perf-3.10.0-693.65.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-693.65.1.el7.ppc64le.rpm python-perf-3.10.0-693.65.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-693.65.1.el7.ppc64le.rpm x86_64: kernel-3.10.0-693.65.1.el7.x86_64.rpm kernel-debug-3.10.0-693.65.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-693.65.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.65.1.el7.x86_64.rpm kernel-devel-3.10.0-693.65.1.el7.x86_64.rpm kernel-headers-3.10.0-693.65.1.el7.x86_64.rpm kernel-tools-3.10.0-693.65.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-693.65.1.el7.x86_64.rpm perf-3.10.0-693.65.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm python-perf-3.10.0-693.65.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm Red Hat Enterprise Linux Server TUS (v. 7.4): Source: kernel-3.10.0-693.65.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-693.65.1.el7.noarch.rpm kernel-doc-3.10.0-693.65.1.el7.noarch.rpm x86_64: kernel-3.10.0-693.65.1.el7.x86_64.rpm kernel-debug-3.10.0-693.65.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-693.65.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.65.1.el7.x86_64.rpm kernel-devel-3.10.0-693.65.1.el7.x86_64.rpm kernel-headers-3.10.0-693.65.1.el7.x86_64.rpm kernel-tools-3.10.0-693.65.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-693.65.1.el7.x86_64.rpm perf-3.10.0-693.65.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm python-perf-3.10.0-693.65.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 7.4): x86_64: kernel-debug-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.65.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-693.65.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional E4S (v. 7.4): ppc64le: kernel-debug-debuginfo-3.10.0-693.65.1.el7.ppc64le.rpm kernel-debug-devel-3.10.0-693.65.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-693.65.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-693.65.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-693.65.1.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-693.65.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-693.65.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-693.65.1.el7.ppc64le.rpm x86_64: kernel-debug-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.65.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-693.65.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional TUS (v. 7.4): x86_64: kernel-debug-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.65.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-693.65.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.65.1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-14816 https://access.redhat.com/security/cve/CVE-2019-17666 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXoxI1NzjgjWX9erEAQjNGA//Z+tsRqhAeBGL9vdmjLK4GVN7z65CWRQz rNc8ZR0BJxd09O/WZ+IRsGfSv/BSacXMrKSCSufc3ejfLcA32kTQJ1z48Gft+1Zn uwQ+P/IuEdTZEG30oObK9H7tHn90yFwVcHP1Deo3fNTNbl4E2GFEMVP9SyAtkcqa 4HV4lY8X8bQuaxV+GB9gTkJwB1Rk2kA3CQRXmR4DG9zx08SlKCZeW4XnFaXg3mf8 DQUpQdNrUOiBcgFTJ9Vp62i4LHyFGJftmhWg0dEqc58qMi/Eg385ixrAx79N3qKR cb9pgRjMHogn6nYUglhGLG43diERps12zJCWUILCboX/h7nnrsgeJC2d5op+B/c0 NJJkbEhWSOo8SeapJ/3vOycmqsbxY4sVwbZBv+1DSgLv8oxN085oti0ndo6sfL1W /1wnuPyxqcG/Fi7LY2og64ZLMbpUQPu7f+SxzxS3Oeq/Qun9FSsZWciTsjOEHpBD I1eSoXQHDUoh5eIFePGtv0GWktEMTcSw4YPP9Gj0zXOkj6fxrtarZO5bftpZXZHm qwxYte0FzoZ+4ouoKwASwqwqFKUmksh5OMrGkjaj8zXxtjXLtxtkPlUNfafhpneG z8WvuueE6t/L3INoXvvVG13y5tpoTfvNbWLRQkYG5nu+3sAS2lgVE/4iRu4Cxx+C xg/lH8knNDE=VXlG -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 7.6) - ppc64, ppc64le, x86_64 3. Bug Fix(es): * [PATCH] perf: Fix a race between ring_buffer_detach() and ring_buffer_wakeup() (BZ#1772826) * core: backports from upstream (BZ#1780031) * Race between tty_open() and flush_to_ldisc() using the tty_struct->driver_data field. (BZ#1780160) * [Hyper-V][RHEL7.6]Hyper-V guest waiting indefinitely for RCU callback when removing a mem cgroup (BZ#1783176) Enhancement(s): * Selective backport: perf: Sync with upstream v4.16 (BZ#1782752) 4

Trust: 1.62

sources: NVD: CVE-2019-14816 // PACKETSTORM: 156058 // PACKETSTORM: 157042 // PACKETSTORM: 154951 // PACKETSTORM: 156603 // PACKETSTORM: 154946 // PACKETSTORM: 154933 // PACKETSTORM: 157140 // PACKETSTORM: 156608

AFFECTED PRODUCTS

vendor:linuxmodel:kernelscope:ltversion:3.16.74

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:19.04

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:8.1

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.5

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:7.6

Trust: 1.0

vendor:netappmodel:a320scope:eqversion: -

Trust: 1.0

vendor:netappmodel:h300sscope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:7.0

Trust: 1.0

vendor:netappmodel:service processorscope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.2

Trust: 1.0

vendor:redhatmodel:enterprise linux compute node eusscope:eqversion:7.6

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:8.4

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.7

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.15

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.4.194

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:6.4

Trust: 1.0

vendor:netappmodel:steelstore cloud integrated storagescope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.9.194

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.19.75

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.6

Trust: 1.0

vendor:redhatmodel:enterprise linux for real time for nfvscope:eqversion:7

Trust: 1.0

vendor:netappmodel:c190scope:eqversion: -

Trust: 1.0

vendor:netappmodel:h300escope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.04

Trust: 1.0

vendor:netappmodel:h700escope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.10

Trust: 1.0

vendor:netappmodel:a220scope:eqversion: -

Trust: 1.0

vendor:netappmodel:h500sscope:eqversion: -

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:15.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for real timescope:eqversion:8

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.3

Trust: 1.0

vendor:netappmodel:fas2720scope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux for real time for nfv tusscope:eqversion:8.4

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:8.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endian eusscope:eqversion:7.6_ppc64

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:8.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for real time tusscope:eqversion:8.4

Trust: 1.0

vendor:redhatmodel:enterprise linux for real time for nfvscope:eqversion:8

Trust: 1.0

vendor:redhatmodel:messaging realtime gridscope:eqversion:2.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.20

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:8.4

Trust: 1.0

vendor:redhatmodel:enterprise linux for real time for nfv tusscope:eqversion:8.2

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:7.6

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.6

Trust: 1.0

vendor:redhatmodel:virtualizationscope:eqversion:4.0

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:6.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for real time tusscope:eqversion:8.2

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.6

Trust: 1.0

vendor:redhatmodel:virtualizationscope:eqversion:4.2

Trust: 1.0

vendor:netappmodel:data availability servicesscope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:8.2

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:redhatmodel:enterprise linux tusscope:eqversion:7.7

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:29

Trust: 1.0

vendor:netappmodel:h500escope:eqversion: -

Trust: 1.0

vendor:netappmodel:solidfirescope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.3

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.2.17

Trust: 1.0

vendor:netappmodel:h410sscope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux for real timescope:eqversion:7

Trust: 1.0

vendor:netappmodel:h610sscope:eqversion: -

Trust: 1.0

vendor:netappmodel:a800scope:eqversion: -

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:30

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:5.0

Trust: 1.0

vendor:netappmodel:hci management nodescope:eqversion: -

Trust: 1.0

vendor:netappmodel:a700sscope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:8.4

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.14.146

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:8.2

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.6

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:8.2

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:15.1

Trust: 1.0

vendor:netappmodel:h700sscope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.17

Trust: 1.0

vendor:netappmodel:fas2750scope:eqversion: -

Trust: 1.0

sources: NVD: CVE-2019-14816

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-14816
value: HIGH

Trust: 1.0

secalert@redhat.com: CVE-2019-14816
value: MEDIUM

Trust: 1.0

nvd@nist.gov: CVE-2019-14816
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

nvd@nist.gov: CVE-2019-14816
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

secalert@redhat.com: CVE-2019-14816
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.0

Trust: 1.0

sources: NVD: CVE-2019-14816 // NVD: CVE-2019-14816

PROBLEMTYPE DATA

problemtype:CWE-122

Trust: 1.0

problemtype:CWE-787

Trust: 1.0

sources: NVD: CVE-2019-14816

THREAT TYPE

local

Trust: 0.2

sources: PACKETSTORM: 154951 // PACKETSTORM: 154933

TYPE

overflow

Trust: 0.5

sources: PACKETSTORM: 156058 // PACKETSTORM: 157042 // PACKETSTORM: 156603 // PACKETSTORM: 157140 // PACKETSTORM: 156608

EXTERNAL IDS

db:NVDid:CVE-2019-14816

Trust: 1.8

db:PACKETSTORMid:154951

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2019/08/28/1

Trust: 1.0

db:PACKETSTORMid:155212

Trust: 1.0

db:PACKETSTORMid:156058

Trust: 0.1

db:PACKETSTORMid:157042

Trust: 0.1

db:PACKETSTORMid:156603

Trust: 0.1

db:PACKETSTORMid:154946

Trust: 0.1

db:PACKETSTORMid:154933

Trust: 0.1

db:PACKETSTORMid:157140

Trust: 0.1

db:PACKETSTORMid:156608

Trust: 0.1

sources: PACKETSTORM: 156058 // PACKETSTORM: 157042 // PACKETSTORM: 154951 // PACKETSTORM: 156603 // PACKETSTORM: 154946 // PACKETSTORM: 154933 // PACKETSTORM: 157140 // PACKETSTORM: 156608 // NVD: CVE-2019-14816

REFERENCES

url:https://www.openwall.com/lists/oss-security/2019/08/28/1

Trust: 2.0

url:https://access.redhat.com/security/cve/cve-2019-14816

Trust: 1.5

url:https://access.redhat.com/errata/rhsa-2020:0204

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2020:0661

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2020:0664

Trust: 1.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=cve-2019-14816

Trust: 1.0

url:https://usn.ubuntu.com/4157-1/

Trust: 1.0

url:https://seclists.org/bugtraq/2019/nov/11

Trust: 1.0

url:https://access.redhat.com/errata/rhsa-2020:0328

Trust: 1.0

url:https://usn.ubuntu.com/4163-1/

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html

Trust: 1.0

url:https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html

Trust: 1.0

url:https://access.redhat.com/errata/rhsa-2020:0339

Trust: 1.0

url:https://access.redhat.com/errata/rhsa-2020:0653

Trust: 1.0

url:https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3

Trust: 1.0

url:https://usn.ubuntu.com/4157-2/

Trust: 1.0

url:https://usn.ubuntu.com/4163-2/

Trust: 1.0

url:http://packetstormsecurity.com/files/154951/kernel-live-patch-security-notice-lsn-0058-1.html

Trust: 1.0

url:https://access.redhat.com/errata/rhsa-2020:0174

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html

Trust: 1.0

url:https://access.redhat.com/errata/rhsa-2020:0375

Trust: 1.0

url:https://usn.ubuntu.com/4162-1/

Trust: 1.0

url:http://packetstormsecurity.com/files/155212/slackware-security-advisory-slackware-14.2-kernel-updates.html

Trust: 1.0

url:https://security.netapp.com/advisory/ntap-20191031-0005/

Trust: 1.0

url:https://access.redhat.com/errata/rhsa-2020:0374

Trust: 1.0

url:https://usn.ubuntu.com/4162-2/

Trust: 1.0

url:https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/t4jz6aeukfwbhqarogmqarj274pqp2qp/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/o3rudqjxrjqvghcgr4yzwtq3ecbi7txh/

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2019-14816

Trust: 0.8

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.5

url:https://access.redhat.com/articles/11258

Trust: 0.5

url:https://access.redhat.com/security/team/contact/

Trust: 0.5

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.5

url:https://bugzilla.redhat.com/):

Trust: 0.5

url:https://access.redhat.com/security/team/key/

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-14821

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-10126

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-14815

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-20856

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2181

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-21008

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-20976

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-14814

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-17133

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-17666

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-14895

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-17133

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-14895

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-17666

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-15505

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-15902

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-5489

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-0154

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-0154

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-12207

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-16884

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-11135

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-14821

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-0155

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-0155

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-14901

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-5489

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14901

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-9506

Trust: 0.1

url:https://access.redhat.com/security/vulnerabilities/ifu-page-mce

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-3900

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-12207

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-9506

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11135

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-16884

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-3900

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-10126

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:1266

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11478

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-10207

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14835

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11477

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-3846

Trust: 0.1

url:https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-10905

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-12614

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14284

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14283

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11833

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-2054

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-0136

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-20961

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-20976

Trust: 0.1

url:https://usn.ubuntu.com/4163-2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-18232

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-15117

Trust: 0.1

url:https://usn.ubuntu.com/4163-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-15118

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-10906

Trust: 0.1

url:https://usn.ubuntu.com/4157-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe/5.0.0-32.34~18.04.2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-15504

Trust: 0.1

url:https://usn.ubuntu.com/4157-2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.0.0-1023.24~18.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-16714

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.0.0-1021.21~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke-5.0/5.0.0-1023.23~18.04.2

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:1347

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-20856

Trust: 0.1

sources: PACKETSTORM: 156058 // PACKETSTORM: 157042 // PACKETSTORM: 154951 // PACKETSTORM: 156603 // PACKETSTORM: 154946 // PACKETSTORM: 154933 // PACKETSTORM: 157140 // PACKETSTORM: 156608 // NVD: CVE-2019-14816

CREDITS

Red Hat

Trust: 0.5

sources: PACKETSTORM: 156058 // PACKETSTORM: 157042 // PACKETSTORM: 156603 // PACKETSTORM: 157140 // PACKETSTORM: 156608

SOURCES

db:PACKETSTORMid:156058
db:PACKETSTORMid:157042
db:PACKETSTORMid:154951
db:PACKETSTORMid:156603
db:PACKETSTORMid:154946
db:PACKETSTORMid:154933
db:PACKETSTORMid:157140
db:PACKETSTORMid:156608
db:NVDid:CVE-2019-14816

LAST UPDATE DATE

2025-06-26T19:56:08.744000+00:00


SOURCES UPDATE DATE

db:NVDid:CVE-2019-14816date:2024-11-21T04:27:25.253

SOURCES RELEASE DATE

db:PACKETSTORMid:156058date:2020-01-23T00:26:55
db:PACKETSTORMid:157042date:2020-04-01T15:21:52
db:PACKETSTORMid:154951date:2019-10-23T18:32:10
db:PACKETSTORMid:156603date:2020-03-03T14:09:01
db:PACKETSTORMid:154946date:2019-10-23T18:28:39
db:PACKETSTORMid:154933date:2019-10-22T17:26:37
db:PACKETSTORMid:157140date:2020-04-07T16:41:32
db:PACKETSTORMid:156608date:2020-03-03T16:33:49
db:NVDid:CVE-2019-14816date:2019-09-20T19:15:11.767