First published: Wed Aug 21 2019(Updated: )
An issue was discovered in the Linux kernel before 5.0.9. There is a use-after-free in atalk_proc_exit, related to net/appletalk/atalk_proc.c, net/appletalk/ddp.c, and net/appletalk/sysctl_net_atalk.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <3.16.74 | |
Linux Kernel | >=3.17<3.18.139 | |
Linux Kernel | >=3.19<4.4.179 | |
Linux Kernel | >=4.5<4.9.170 | |
Linux Kernel | >=4.10<4.14.113 | |
Linux Kernel | >=4.15<4.19.36 | |
Linux Kernel | >=4.20<5.0.9 | |
Debian Linux | =8.0 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.21-1 6.12.22-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15292 is classified as a moderate severity vulnerability due to its potential impact on the Linux kernel integrity.
To fix CVE-2019-15292, upgrade to at least version 5.0.9 of the Linux kernel or apply a relevant security patch provided by your distribution.
CVE-2019-15292 affects Linux kernel versions prior to 5.0.9, including several versions within 3.x to 4.x.
In CVE-2019-15292, a use-after-free vulnerability occurs when a pointer continues to reference memory after it has been freed, which can lead to software instability or exploitation.
CVE-2019-15292 primarily affects the Linux operating system and its derivatives like Debian and Ubuntu; it does not impact other operating systems.