Bug 1745536 (CVE-2019-15219) - CVE-2019-15219 kernel: null pointer dereference in drivers/usb/misc/sisusbvga/sisusb.c driver
Summary: CVE-2019-15219 kernel: null pointer dereference in drivers/usb/misc/sisusbvga...
Alias: CVE-2019-15219
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1745543 1820440 1820441 1820442 1820443 1820444
Blocks: 1745542
TreeView+ depends on / blocked
Reported: 2019-08-26 10:41 UTC by Dhananjay Arunesh
Modified: 2021-10-25 09:53 UTC (History)
40 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A NULL pointer dereference flaw was found in the way the USB2VGA dongles driver in the Linux kernel handled failed initialization. This flaw allows an attacker able to insert USB2VGA dongles into the system to crash the system.
Clone Of:
Last Closed: 2021-10-25 09:53:08 UTC

Attachments (Terms of Use)

Description Dhananjay Arunesh 2019-08-26 10:41:56 UTC
A vulnerability was found in the Linux kernel. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/sisusbvga/sisusb.c driver.


Comment 1 Dhananjay Arunesh 2019-08-26 10:47:21 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1745543]

Comment 2 Justin M. Forbes 2019-08-26 13:18:31 UTC
This was fixed for Fedora with the 5.1.8 stable kernel updates.

Comment 3 Petr Matousek 2020-04-03 05:28:11 UTC

This issue is rated as having Low impact because of the physical access needed to trigger this issue. Also, failed initialization with the core USB subsystem is also a rare event to hit.

Comment 4 Petr Matousek 2020-04-03 05:35:58 UTC

To mitigate this issue, prevent module sisusbvga from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.

Note You need to log in before you can comment on or make changes to this bug.