SB2019120342 - Multiple vulnerabilities in Linux kernel 



SB2019120342 - Multiple vulnerabilities in Linux kernel

Published: December 3, 2019 Updated: July 17, 2020

Security Bulletin ID SB2019120342
Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Use-after-free (CVE-ID: CVE-2019-19530)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to use-after-free error in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef. A local user can use a malicious USB device to trigger use-after-free error and execute arbitrary code on the system with elevated privileges.


2) Race condition (CVE-ID: CVE-2019-19537)

The vulnerability allows a local non-authenticated attacker to perform a denial of service (DoS) attack.

In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.


Remediation

Install update from vendor's website.