logo
DATABASE RESOURCES PRICING ABOUT US

CVE-2019-15099

Description

A null pointer dereference flaw was discovered in the Linux kernel's implementation of the ath10k USB device driver. The vulnerability requires the attacker to plug in a specially crafted hardware device that present endpoint descriptors that normal ath10k devices do not recognize. System availability is the highest threat with this vulnerability. #### Mitigation As the ath10k module will be auto-loaded when required, its use can be disabled by preventing the module from loading using the following instructions. On the command line, as root, execute the following command: # echo "install ath10k_usb /bin/true" >> /etc/modprobe.d/disable-ath10k_usb.conf The system will need to be restarted if the ath10k_usb module are loaded. In most circumstances, the kernel modules will be unable to be unloaded while the ath10k WiFi network interface is in use. If the system requires this module to work correctly, this mitigation may not be suitable. If you need further assistance, see KCS article <https://access.redhat.com/solutions/41278> or contact Red Hat Global Support Services.


Related