vulnerability
Ubuntu: (CVE-2019-15239): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | Aug 20, 2019 | Nov 19, 2024 | Sep 5, 2025 |
Description
In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. Specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. This can result in a kernel crash, or potentially in privilege escalation. NOTE: this affects (for example) Linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.
Solutions
References
- CVE-2019-15239
- https://attackerkb.com/topics/CVE-2019-15239
- CWE-416
- URL-https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7f582b248d0a86bae5788c548d7bb5bca6f7691a
- URL-https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/xenial/commit/?id=edff0f7fc52aa3fba1141755ae5aa008c51eb518
- URL-https://lore.kernel.org/stable/[email protected]/
- URL-https://pulsesecurity.co.nz/advisories/linux-kernel-4.9-tcpsocketsuaf
- URL-https://salsa.debian.org/kernel-team/kernel-sec/blob/f6273af2d956a87296b6b60379d0a186c9be4bbc/active/CVE-2019-15239
- URL-https://www.cve.org/CVERecord?id=CVE-2019-15239
- URL-https://www.debian.org/security/2019/dsa-4497
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.