Use-after-free in Linux kernel



Published: 2019-09-04 | Updated: 2020-01-09
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2019-15917
CWE-ID CWE-416
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Use-after-free

EUVDB-ID: #VU24172

Risk: Low

CVSSv3.1: 5.9 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-15917

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when hci_uart_register_dev() fails in hci_uart_set_proto() in drivers/bluetooth/hci_ldisc.c. A remote attacker with physical proximity to the system can send specially crafted Bluetoth data and execute arbitrary code.


Mitigation

Install updates from vendor's website.

Vulnerable software versions

Linux kernel: 5.0 - 5.0.4

External links

http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
http://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.5
http://github.com/torvalds/linux/commit/56897b217a1d0a91c9920cb418d6b3fe922f590a
http://lists.debian.org/debian-lts-announce/2019/09/msg00025.html


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###