Vulnerability Description
A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-96c5c6e6a5b6.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Canonical | Ubuntu Linux | 18.04 |
| Fedoraproject | Fedora | 30 |
| Linux | Linux Kernel | <= 5.3.11 |
| Redhat | Enterprise Linux | 8.0 |
Related Weaknesses (CWE)
References
- https://github.com/torvalds/linux/commit/96c5c6e6a5b6db592acae039fed54b5c8844cd3PatchThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://security.netapp.com/advisory/ntap-20191205-0001/Third Party Advisory
- https://usn.ubuntu.com/4225-1/Third Party Advisory
- https://usn.ubuntu.com/4225-2/Third Party Advisory
- https://usn.ubuntu.com/4226-1/Third Party Advisory
- https://github.com/torvalds/linux/commit/96c5c6e6a5b6db592acae039fed54b5c8844cd3PatchThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://security.netapp.com/advisory/ntap-20191205-0001/Third Party Advisory
- https://usn.ubuntu.com/4225-1/Third Party Advisory
- https://usn.ubuntu.com/4225-2/Third Party Advisory
- https://usn.ubuntu.com/4226-1/Third Party Advisory
FAQ
What is CVE-2019-19072?
CVE-2019-19072 is a vulnerability with a CVSS score of 4.4 (MEDIUM). A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-96c...
How severe is CVE-2019-19072?
CVE-2019-19072 has been rated MEDIUM with a CVSS base score of 4.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-19072?
Check the references section above for vendor advisories and patch information. Affected products include: Canonical Ubuntu Linux, Fedoraproject Fedora, Linux Linux Kernel, Redhat Enterprise Linux.