First published: Wed Jul 17 2019(Updated: )
A vulnerability was discovered in the linux kernels implementation of "GTCO tablet/digitizer"s version of parse_hid_report_descriptor in drivers. An attacker with local access could create a malicious USB device which must be inserted into the local usb port to send a crafted USB response that triggers an out-of-bounds write during generation of debugging messages. It is unlikely that this attack is effective or wide-spread as it requires specific usb hardware and physical access to the hardware to exploit. Reference: <a href="https://patchwork.kernel.org/patch/11040813/">https://patchwork.kernel.org/patch/11040813/</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=5.2.1 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.21-1 6.12.22-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13631 is classified as a high-severity vulnerability due to its potential for local exploitation with malicious USB devices.
To mitigate CVE-2019-13631, update your Linux kernel to version 5.10.223-1, 5.10.226-1, 6.1.123-1, 6.1.119-1, or 6.12.10-1.
CVE-2019-13631 affects users running vulnerable versions of the Linux kernel up to 5.2.1.
CVE-2019-13631 can be exploited by an attacker with local access who inserts a malicious USB device.
No, CVE-2019-13631 is a vulnerability in the Linux kernel and not related to web browsers.