First published: Mon Nov 18 2019(Updated: )
A flaw was found in the way the predicate_parse function in the tracing subsystem of the Linux kernel handled resource cleanup on error. This flaw allows an attacker with the ability to produce the error to crash the system.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-240.rt7.54.el8 | 0:4.18.0-240.rt7.54.el8 |
redhat/kernel | <0:4.18.0-240.el8 | 0:4.18.0-240.el8 |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =19.04 | |
Ubuntu Linux | =19.10 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Linux Kernel | <=5.3.11 | |
Red Hat Enterprise Linux | =8.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 | |
Ubuntu | =18.04 | |
Ubuntu | =19.04 | |
Ubuntu | =19.10 | |
Fedora | =30 | |
Fedora | =31 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19072 is classified as a vulnerability that can lead to system crashes due to resource cleanup issues in the Linux kernel.
To fix CVE-2019-19072, you should update to the patched versions of the kernel provided by your Linux distribution.
CVE-2019-19072 affects various Linux distributions, including specific versions of Red Hat Enterprise Linux, Ubuntu, and Fedora.
CVE-2019-19072 requires an attacker to have the ability to produce a specific error on the system, suggesting that it may not be directly exploitable remotely.
The impact of CVE-2019-19072 is that it could lead to a denial-of-service condition by crashing affected systems.