The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

cybersecurity announce CVE-2019-19543

Linux kernel: use after free via serial_ir_init_module

Synthesis of the vulnerability

An attacker can force the usage of a freed memory area via serial_ir_init_module() of the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Severity of this weakness: 2/4.
Creation date: 04/12/2019.
Références of this bulletin: CVE-2019-19543, VIGILANCE-VUL-31062.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can force the usage of a freed memory area via serial_ir_init_module...
Full Vigil@nce bulletin... (Free trial)

This threat alert impacts software or systems such as Linux.

Our Vigil@nce team determined that the severity of this computer vulnerability bulletin is medium.

The trust level is of type confirmed by the editor, with an origin of user shell.

An attacker with a expert ability can exploit this weakness note.

Solutions for this threat

Patches for this vulnerability are not yet public.
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides cybersecurity announces. The technology watch team tracks security threats targeting the computer system. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.