First published: Fri Mar 15 2019(Updated: )
A flaw was found in the Linux kernel vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). References: <a href="https://seclists.org/oss-sec/2019/q2/6">https://seclists.org/oss-sec/2019/q2/6</a> A suggested fix: <a href="https://lore.kernel.org/lkml/155414977872.12780.13728555131525362206.stgit@gimli.home/T/#u">https://lore.kernel.org/lkml/155414977872.12780.13728555131525362206.stgit@gimli.home/T/#u</a>
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1062.rt56.1022.el7 | 0:3.10.0-1062.rt56.1022.el7 |
redhat/kernel | <0:3.10.0-1062.el7 | 0:3.10.0-1062.el7 |
redhat/kernel-rt | <0:4.18.0-147.rt24.93.el8 | 0:4.18.0-147.rt24.93.el8 |
redhat/kernel | <0:4.18.0-147.el8 | 0:4.18.0-147.el8 |
Linux Kernel | =3.10 | |
Linux Kernel | =4.14 | |
Linux Kernel | =4.18 | |
Fedora | ||
Debian | =8.0 | |
Debian | =9.0 | |
Debian | =10.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
Ubuntu | =19.04 | |
SUSE Linux | =15.0 | |
SUSE Linux | =15.1 | |
SUSE Linux | =42.3 | |
NetApp Active IQ Unified Manager | >=9.5 | |
NetApp SolidFire & HCI Management Node | ||
NetApp SnapProtect | ||
NetApp SolidFire & HCI Storage Node | ||
NetApp Storage Replication Adapter | >=7.2 | |
NetApp VASA Provider | >=7.2 | |
NetApp Virtual Storage Console | >=7.2 | |
All of | ||
NetApp CN1610 | ||
NetApp CN1610 Firmware | ||
NetApp CN1610 | ||
NetApp CN1610 Firmware | ||
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-3882 is classified as a high severity vulnerability due to its potential to allow attackers to exhaust system memory.
To fix CVE-2019-3882, users should update to the recommended kernel version specified by their Linux distribution.
CVE-2019-3882 affects users of the Linux kernel versions 3.10, 4.14, and 4.18, particularly those who use vfio drivers.
CVE-2019-3882 enables local attackers to bypass user memory limits through administrative privileges on vfio-bound devices.
CVE-2019-3882 impacts various Linux distributions that incorporate the affected kernel versions, including Red Hat, Debian, and Ubuntu.