The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

security note CVE-2019-2215

Linux kernel: use after free via binder.c

Synthesis of the vulnerability

An attacker can force the usage of a freed memory area via binder.c of the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Severity of this weakness: 2/4.
Creation date: 08/11/2019.
Références of this bulletin: CERTFR-2019-AVI-555, CVE-2019-2215, SSA:2019-311-01, USN-4186-1, USN-4186-2, USN-4186-3, VIGILANCE-VUL-30810.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can force the usage of a freed memory area via binder.c of the Linux...
Full Vigil@nce bulletin... (Free trial)

This threat announce impacts software or systems such as Android OS, Linux, Slackware, Ubuntu.

Our Vigil@nce team determined that the severity of this cybersecurity alert is medium.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this security alert.

Solutions for this threat

Patches for this vulnerability are not yet public.
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides applications vulnerabilities patches. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.