A use-after-free flaw was found in the pn533_usb_probe USB interface in the Linux kernel. If the driver registration fails it needs to do all the cleanup activity and free all the related resources. A malicious USB device can cause this process to fail, causing a use-after-free vulnerability. System availability is the highest threat with this vulnerability.
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
seclists.org/oss-sec/2019/q4/115
www.openwall.com/lists/oss-security/2019/12/03/4
bugzilla.redhat.com/show_bug.cgi?id=1783494
cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6af3aa57a0984e061f61308fe181a9a12359fecc
nvd.nist.gov/vuln/detail/CVE-2019-19526
www.cve.org/CVERecord?id=CVE-2019-19526