First published: Wed Jan 16 2019(Updated: )
A memory leak was discovered in the backport of fixes for <a href="https://access.redhat.com/security/cve/CVE-2018-16864">CVE-2018-16864</a> in Red Hat Enterprise Linux (since version v219-62.2) and CentOS. Function dispatch_message_real() in journald-server.c does not free the memory allocated by set_iovec_field_free() to store the `_CMDLINE=` entry. A local attacker may use this flaw to make systemd-journald crash. However systemd-journald crash is automatically restarted by systemd by default.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Openshift Container Platform | =3.11 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Eus | =7.6 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3815 is a vulnerability discovered in Red Hat Enterprise Linux that allows a local attacker to cause a memory leak.
CVE-2019-3815 has a severity level of low with a severity value of 3.3.
CVE-2019-3815 affects Red Hat Openshift Container Platform 3.11, Red Hat Enterprise Linux Desktop 7.0, Red Hat Enterprise Linux Server 7.0, Red Hat Enterprise Linux Server Aus 7.6, Red Hat Enterprise Linux Server Eus 7.6, Red Hat Enterprise Linux Workstation 7.0, and Debian Debian Linux 8.0.
A local attacker can exploit CVE-2019-3815 by using a memory leak to overload the memory allocation, potentially causing a denial of service or other malicious actions.
You can find more information about CVE-2019-3815 on the SecurityFocus and Red Hat websites.