First published: Wed Nov 21 2018(Updated: )
Last updated 29 November 2024
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | <=4.19.2 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =18.10 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19407 is classified as a denial of service vulnerability due to its potential to cause a NULL pointer dereference.
To mitigate CVE-2018-19407, users should upgrade to a patched version of the Linux kernel, specifically versions 5.10.223-1, 5.10.226-1, 6.1.123-1, 6.1.119-1, or 6.12.10-1.
CVE-2018-19407 affects the Linux kernel versions up to and including 4.19.2.
CVE-2018-19407 requires local access to exploit, making it less likely to be exploited remotely.
CVE-2018-19407 impacts systems running specific distributions of the Linux kernel, particularly Debian and Ubuntu versions mentioned in the advisory.