CVE Vulnerabilities

CVE-2019-15504

Double Free

Published: Aug 23, 2019 | Modified: Nov 21, 2024
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
10 HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
8.4 MODERATE
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).

Weakness

The product calls free() twice on the same memory address.

Affected Software

NameVendorStart VersionEnd Version
Linux_kernelLinux4.17 (including)4.19.74 (excluding)
Linux_kernelLinux4.20 (including)5.2.16 (excluding)
LinuxUbuntudisco*
LinuxUbuntuesm-infra-legacy/trusty*
LinuxUbuntuprecise/esm*
LinuxUbuntutrusty*
LinuxUbuntutrusty/esm*
LinuxUbuntuupstream*
Linux-awsUbuntudisco*
Linux-awsUbuntuesm-infra-legacy/trusty*
Linux-awsUbuntutrusty*
Linux-awsUbuntutrusty/esm*
Linux-awsUbuntuupstream*
Linux-aws-5.0Ubuntuupstream*
Linux-aws-hweUbuntuupstream*
Linux-azureUbuntubionic*
Linux-azureUbuntudisco*
Linux-azureUbuntuesm-infra-legacy/trusty*
Linux-azureUbuntuesm-infra/bionic*
Linux-azureUbuntutrusty*
Linux-azureUbuntutrusty/esm*
Linux-azureUbuntuupstream*
Linux-azure-5.3Ubuntuupstream*
Linux-azure-edgeUbuntubionic*
Linux-azure-edgeUbuntuesm-infra/bionic*
Linux-azure-edgeUbuntuupstream*
Linux-gcpUbuntubionic*
Linux-gcpUbuntudisco*
Linux-gcpUbuntuesm-infra/bionic*
Linux-gcpUbuntuupstream*
Linux-gcp-5.3Ubuntuupstream*
Linux-gcp-edgeUbuntubionic*
Linux-gcp-edgeUbuntuesm-infra/bionic*
Linux-gcp-edgeUbuntuupstream*
Linux-gke-4.15Ubuntuupstream*
Linux-gke-5.0Ubuntubionic*
Linux-gke-5.0Ubuntuupstream*
Linux-gke-5.3Ubuntuupstream*
Linux-hweUbuntubionic*
Linux-hweUbuntuesm-infra/bionic*
Linux-hweUbuntuupstream*
Linux-hwe-edgeUbuntubionic*
Linux-hwe-edgeUbuntuesm-infra/bionic*
Linux-hwe-edgeUbuntuupstream*
Linux-kvmUbuntudisco*
Linux-kvmUbuntuupstream*
Linux-lts-trustyUbuntuprecise/esm*
Linux-lts-trustyUbuntuupstream*
Linux-lts-xenialUbuntuesm-infra-legacy/trusty*
Linux-lts-xenialUbuntutrusty*
Linux-lts-xenialUbuntutrusty/esm*
Linux-lts-xenialUbuntuupstream*
Linux-oemUbuntuupstream*
Linux-oemUbuntuxenial*
Linux-oem-5.6Ubuntuupstream*
Linux-oem-osp1Ubuntubionic*
Linux-oem-osp1Ubuntudisco*
Linux-oem-osp1Ubuntueoan*
Linux-oem-osp1Ubuntuupstream*
Linux-oracleUbuntudisco*
Linux-oracleUbuntuupstream*
Linux-oracle-5.0Ubuntuupstream*
Linux-oracle-5.3Ubuntuupstream*
Linux-raspi2Ubuntudisco*
Linux-raspi2Ubuntuupstream*
Linux-raspi2-5.3Ubuntuupstream*
Linux-snapdragonUbuntudisco*
Linux-snapdragonUbuntuupstream*

Potential Mitigations

References