Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-15212

Опубликовано: 19 авг. 2019
Источник: redhat
CVSS3: 6.1
EPSS Низкий

Описание

An issue was discovered in the Linux kernel before 5.1.8. There is a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver.

A use-after-free flaw was found in the RIO500 driver in the Linux kernel. The implementation of the driver did not consider that multiple RIO500 devices could be attached to the same system, simultaneously. When a second device connects, the system overwrites the data structures in use by the first allowing a local attacker to possibly create a use-after-free situation which can lead to memory corruption, system panic, or privilege escalation. The highest threat from this vulnerability is to system availability, although data integrity is also at risk as well.

Меры по смягчению последствий

As the rio500 module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:

echo "blacklist rio500" >> /etc/modprobe.d/rio-500.conf

echo "install rio500 /bin/false" >> /etc/modprobe.d/rio-500.conf

The system will need to be restarted if the RIO500 modules are loaded. In most circumstances, the kernel modules will be unable to be unloaded while any devices or programs are using the USB device. If the system requires this module to work correctly, this mitigation may not be suitable. If you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelOut of support scope
Red Hat Enterprise Linux 6kernelOut of support scope
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-altNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise MRG 2kernelNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=1743556kernel: double-free caused by malicious USB device in drivers/usb/misc/rio500.c

EPSS

Процентиль: 29%
0.00106
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.6
ubuntu
больше 6 лет назад

An issue was discovered in the Linux kernel before 5.1.8. There is a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver.

CVSS3: 4.6
nvd
больше 6 лет назад

An issue was discovered in the Linux kernel before 5.1.8. There is a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver.

CVSS3: 4.6
debian
больше 6 лет назад

An issue was discovered in the Linux kernel before 5.1.8. There is a d ...

CVSS3: 4.6
github
больше 3 лет назад

An issue was discovered in the Linux kernel before 5.1.8. There is a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver.

CVSS3: 4.6
fstec
больше 6 лет назад

Уязвимость драйвера drivers/usb/misc/rio500.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 29%
0.00106
Низкий

6.1 Medium

CVSS3

Уязвимость CVE-2019-15212