{"id":"CVE-2019-15098","details":"drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.","modified":"2026-03-12T23:04:44.514851Z","published":"2019-08-16T02:15:11.393Z","related":["SUSE-SU-2019:2412-1","SUSE-SU-2019:2414-1","SUSE-SU-2019:2424-1","SUSE-SU-2019:2648-1","SUSE-SU-2019:2651-1","SUSE-SU-2019:2658-1","SUSE-SU-2019:2738-1","SUSE-SU-2019:2756-1","SUSE-SU-2019:2949-1","SUSE-SU-2019:2950-1","SUSE-SU-2019:2984-1","openSUSE-SU-2019:2173-1","openSUSE-SU-2019:2181-1","openSUSE-SU-2024:10728-1","openSUSE-SU-2024:13704-1"],"references":[{"type":"WEB","url":"https://lore.kernel.org/linux-wireless/20190804002905.11292-1-benquike%40gmail.com/T/#u"},{"type":"WEB","url":"https://support.f5.com/csp/article/K61214359?utm_source=f5support&amp%3Butm_medium=RSS"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2019/09/27/3"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4185-1/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2019/09/27/1"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4186-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4186-2/"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2019/09/27/2"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2019/Nov/11"},{"type":"ADVISORY","url":"https://support.f5.com/csp/article/K61214359"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4184-1/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20190905-0002/"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"5.2.9"}]},{"events":[{"introduced":"9.5"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.04"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-15098.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}