SB2020022625 - RSA Authentication Manager update for third-party components
Published: February 26, 2020 Updated: May 17, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 17 secuirty vulnerabilities.
1) Use-after-free (CVE-ID: CVE-2019-19531)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to use-after-free error in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca. A local user can use a malicious USB device to trigger use-after-free error and execute arbitrary code on the system with elevated privileges.
2) Race condition (CVE-ID: CVE-2019-19537)
The vulnerability allows a local non-authenticated attacker to perform a denial of service (DoS) attack.
In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.
3) Information disclosure (CVE-ID: CVE-2019-19535)
The vulnerability allows a local non-authenticated attacker to gain access to sensitive information.
In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042.
4) Use-after-free (CVE-ID: CVE-2019-19527)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to use-after-free error in the drivers/hid/usbhid/hiddev.c driver. A local user can use a malicious USB device to trigger use-after-free error and execute arbitrary code on the system with elevated privileges.
5) Information disclosure (CVE-ID: CVE-2019-19533)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to an info-leak bug in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver. A local user with physical access can use a malicious USB device and gain unauthorized access to sensitive information on the system.
6) Out-of-bounds write (CVE-ID: CVE-2019-19532)
The vulnerability allows a local user to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c. A local user with physical access can use a malicious USB device in the Linux kernel HID drivers, trigger out-of-bounds write and execute arbitrary code on the target system.
7) Use-after-free (CVE-ID: CVE-2019-19523)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to use-after-free error in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79. A local user can use a malicious USB device to trigger use-after-free error and execute arbitrary code on the system with elevated privileges.
8) Use-after-free (CVE-ID: CVE-2019-19525)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to use-after-free error in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035. A local user can use a malicious USB device to trigger use-after-free error and execute arbitrary code on the system with elevated privileges.
9) Resource management error (CVE-ID: CVE-2019-12625)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect processing of large zip archives. A remote attacker can send an overly large zip file and consume all available system resources.
10) Use-after-free (CVE-ID: CVE-2019-19524)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to use-after-free error in the drivers/input/ff-memless.c driver. A local user can use a malicious USB device to trigger use-after-free error and execute arbitrary code on the system with elevated privileges.
11) Use-after-free (CVE-ID: CVE-2019-19530)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to use-after-free error in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef. A local user can use a malicious USB device to trigger use-after-free error and execute arbitrary code on the system with elevated privileges.
12) Information disclosure (CVE-ID: CVE-2019-19534)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output within the USB driver in drivers/net/can/usb/peak_usb/pcan_usb_core.c driver. A local use can use a specially crafted USB devices to gain unauthorized access to sensitive information on the system.
13) Information disclosure (CVE-ID: CVE-2019-19536)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output in drivers/net/can/usb/peak_usb/pcan_usb_pro.c USB driver. A local user can use a specially crafted USB device to gain unauthorized access to sensitive information on the system.
14) Use-after-free (CVE-ID: CVE-2019-15213)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to use-after-free error in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver. A local user can use a malicious USB device to trigger use-after-free error and execute arbitrary code on the system with elevated privileges.
15) Memory leak (CVE-ID: CVE-2019-19052)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486. A remote attacker can perform a denial of service attack.
16) Input validation error (CVE-ID: CVE-2019-15961)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input passed via email messages due to overly long parsing of MIME messages. A remote attacker can send a specially crafted email message and perform a denial of service attack.
17) Out-of-bounds write (CVE-ID: CVE-2019-12900)
Remediation
Install update from vendor's website.