First published: Fri Mar 15 2019(Updated: )
A flaw was found in the Linux kernel vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). References: <a href="https://seclists.org/oss-sec/2019/q2/6">https://seclists.org/oss-sec/2019/q2/6</a> A suggested fix: <a href="https://lore.kernel.org/lkml/155414977872.12780.13728555131525362206.stgit@gimli.home/T/#u">https://lore.kernel.org/lkml/155414977872.12780.13728555131525362206.stgit@gimli.home/T/#u</a>
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1062.rt56.1022.el7 | 0:3.10.0-1062.rt56.1022.el7 |
redhat/kernel | <0:3.10.0-1062.el7 | 0:3.10.0-1062.el7 |
redhat/kernel-rt | <0:4.18.0-147.rt24.93.el8 | 0:4.18.0-147.rt24.93.el8 |
redhat/kernel | <0:4.18.0-147.el8 | 0:4.18.0-147.el8 |
Linux Linux kernel | =3.10 | |
Linux Linux kernel | =4.14 | |
Linux Linux kernel | =4.18 | |
Fedoraproject Fedora | ||
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
Canonical Ubuntu Linux | =19.04 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =42.3 | |
Netapp Active Iq Unified Manager For Vmware Vsphere | >=9.5 | |
Netapp Hci Management Node | ||
Netapp Snapprotect | ||
Netapp Solidfire | ||
Netapp Storage Replication Adapter For Clustered Data Ontap For Vmware Vsphere | >=7.2 | |
Netapp Vasa Provider For Clustered Data Ontap | >=7.2 | |
NetApp Virtual Storage Console for VMware vSphere | >=7.2 | |
Netapp Cn1610 Firmware | ||
Netapp Cn1610 | ||
All of | ||
Netapp Cn1610 Firmware | ||
Netapp Cn1610 | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)