TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2019-3882

MEDIUM
5.5

Beschreibung

A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.

CVE Details

CVSS v3.1 Bewertung5.5
SchweregradMEDIUM
CVSS VektorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AngriffsvektorLOCAL
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht4/24/2019
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0

Betroffene Produkte

canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedoralinux:linux_kernelnetapp:active_iq_unified_manager_for_vmware_vspherenetapp:cn1610netapp:cn1610_firmwarenetapp:hci_management_nodenetapp:snapprotectnetapp:solidfirenetapp:storage_replication_adapter_for_clustered_data_ontap_for_vmware_vspherenetapp:vasa_provider_for_clustered_data_ontapnetapp:virtual_storage_console_for_vmware_vsphereopensuse:leap

Schwachen (CWE)

CWE-770CWE-770

Referenzen

https://usn.ubuntu.com/3979-1/(secalert@redhat.com)
https://usn.ubuntu.com/3980-1/(secalert@redhat.com)
https://usn.ubuntu.com/3980-2/(secalert@redhat.com)
https://usn.ubuntu.com/3981-1/(secalert@redhat.com)
https://usn.ubuntu.com/3981-2/(secalert@redhat.com)
https://usn.ubuntu.com/3982-1/(secalert@redhat.com)
https://usn.ubuntu.com/3982-2/(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:2029(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2043(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3309(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3517(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3882(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Aug/18(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20190517-0005/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3979-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3980-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3980-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3981-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3981-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3982-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3982-2/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4497(af854a3a-2127-422b-91ae-364da2661108)

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.