A use-after-free flaw was found in the acm_probe USB subsystem in the Linux kernel. A race condition occurs when a destroy() procedure is initiated allowing the refcount to decrement on the interface so early that it is never under counted. A malicious USB device is required for exploit. System availability is the largest threat from the vulnerability, however data integrity and confidentiality are also threatened.
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
seclists.org/oss-sec/2019/q4/115
www.openwall.com/lists/oss-security/2019/12/03/4
bugzilla.redhat.com/show_bug.cgi?id=1783518
cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c52873e5a1ef72f845526d9f6a50704433f9c625
nvd.nist.gov/vuln/detail/CVE-2019-19530
www.cve.org/CVERecord?id=CVE-2019-19530