SB2019081912 - Use-after-free in Linux kernel 



SB2019081912 - Use-after-free in Linux kernel

Published: August 19, 2019 Updated: September 4, 2019

Security Bulletin ID SB2019081912
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Use-after-free (CVE-ID: CVE-2016-10905)

The vulnerability allows a local user to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in the "fs/gfs2/rgrp.c" file. A local authenticated user can access the system, execute an application that submits malicious input to the affected software, cause a use-after-free condition in the "gfs2_clear_rgrpd" and "read_rindex_entry" functions and execute arbitrary code or cause a DoS condition.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


Remediation

Install update from vendor's website.