vulnerability
SUSE: CVE-2019-15239: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | Aug 20, 2019 | Sep 21, 2019 | Feb 4, 2022 |
Description
In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. Specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. This can result in a kernel crash, or potentially in privilege escalation. NOTE: this affects (for example) Linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.
Solution(s)
References
- SUSE-SUSE-SU-2019:2412-1
- SUSE-SUSE-SU-2019:2414-1
- SUSE-SUSE-SU-2019:2424-1
- SUSE-SUSE-SU-2019:2648-1
- SUSE-SUSE-SU-2019:2651-1
- SUSE-SUSE-SU-2019:2658-1
- SUSE-SUSE-SU-2019:2738-1
- SUSE-SUSE-SU-2019:2756-1
- SUSE-SUSE-SU-2019:2949-1
- SUSE-SUSE-SU-2019:3215-1
- SUSE-SUSE-SU-2019:3228-1
- SUSE-SUSE-SU-2019:3230-1
- SUSE-SUSE-SU-2019:3249-1
- SUSE-SUSE-SU-2019:3258-1
- NVD-CVE-2019-15239

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.