Rapid7 Vulnerability & Exploit Database

Alma Linux: CVE-2019-18874: Moderate: python-psutil security update (Multiple Advisories)

Back to Search

Alma Linux: CVE-2019-18874: Moderate: python-psutil security update (Multiple Advisories)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
11/12/2019
Created
05/05/2022
Added
05/04/2022
Modified
05/20/2022

Description

psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of refcount mishandling within a while or for loop that converts system data into a Python object.

Solution(s)

  • alma-upgrade-python3-psutil
  • alma-upgrade-python38-Cython
  • alma-upgrade-python38-PyMySQL
  • alma-upgrade-python38-asn1crypto
  • alma-upgrade-python38-atomicwrites
  • alma-upgrade-python38-attrs
  • alma-upgrade-python38-babel
  • alma-upgrade-python38-cffi
  • alma-upgrade-python38-chardet
  • alma-upgrade-python38-cryptography
  • alma-upgrade-python38-idna
  • alma-upgrade-python38-jinja2
  • alma-upgrade-python38-markupsafe
  • alma-upgrade-python38-mod_wsgi
  • alma-upgrade-python38-more-itertools
  • alma-upgrade-python38-numpy
  • alma-upgrade-python38-numpy-doc
  • alma-upgrade-python38-numpy-f2py
  • alma-upgrade-python38-packaging
  • alma-upgrade-python38-pluggy
  • alma-upgrade-python38-ply
  • alma-upgrade-python38-psutil
  • alma-upgrade-python38-psycopg2
  • alma-upgrade-python38-psycopg2-doc
  • alma-upgrade-python38-psycopg2-tests
  • alma-upgrade-python38-py
  • alma-upgrade-python38-pycparser
  • alma-upgrade-python38-pyparsing
  • alma-upgrade-python38-pysocks
  • alma-upgrade-python38-pytest
  • alma-upgrade-python38-pytz
  • alma-upgrade-python38-pyyaml
  • alma-upgrade-python38-requests
  • alma-upgrade-python38-scipy
  • alma-upgrade-python38-setuptools
  • alma-upgrade-python38-setuptools-wheel
  • alma-upgrade-python38-six
  • alma-upgrade-python38-urllib3
  • alma-upgrade-python38-wcwidth
  • alma-upgrade-python38-wheel
  • alma-upgrade-python38-wheel-wheel

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;