5.5

CVE-2019-3882

A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version3.10
LinuxLinux Kernel Version4.14
LinuxLinux Kernel Version4.18
DebianDebian Linux Version8.0
DebianDebian Linux Version9.0
DebianDebian Linux Version10.0
CanonicalUbuntu Linux Version14.04 SwEditionesm
CanonicalUbuntu Linux Version16.04 SwEditionlts
CanonicalUbuntu Linux Version18.04 SwEditionlts
CanonicalUbuntu Linux Version18.10
CanonicalUbuntu Linux Version19.04
OpensuseLeap Version15.0
OpensuseLeap Version15.1
OpensuseLeap Version42.3
NetappSnapprotect Version-
NetappSolidfire Version-
NetappCn1610 Firmware Version-
   NetappCn1610 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.08% 0.243
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5.5 1.8 3.6
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 4.9 3.9 6.9
AV:L/AC:L/Au:N/C:N/I:N/A:C
secalert@redhat.com 4.7 1 3.6
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE-770 Allocation of Resources Without Limits or Throttling

The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.

https://seclists.org/bugtraq/2019/Aug/18
Third Party Advisory
Mailing List
https://usn.ubuntu.com/3980-1/
Third Party Advisory
https://usn.ubuntu.com/3980-2/
Third Party Advisory
https://usn.ubuntu.com/3981-1/
Third Party Advisory
https://usn.ubuntu.com/3981-2/
Third Party Advisory
https://usn.ubuntu.com/3979-1/
Third Party Advisory
https://usn.ubuntu.com/3982-1/
Third Party Advisory
https://usn.ubuntu.com/3982-2/
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3882
Patch
Third Party Advisory
Issue Tracking