CVE-2019-3882

NameCVE-2019-3882
DescriptionA flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1799-1, DLA-1885-1, DSA-4497-1
NVD severitymedium (attack range: local)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
linux (PTS)jessie3.16.56-1+deb8u1vulnerable
jessie (security)3.16.72-1fixed
stretch4.9.168-1vulnerable
stretch (security)4.9.168-1+deb9u5fixed
buster4.19.37-5fixed
buster (security)4.19.37-5+deb10u2fixed
bullseye4.19.37-6fixed
sid5.2.9-2fixed
linux-4.9 (PTS)jessie (security)4.9.168-1+deb9u5~deb8u1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
linuxsource(unstable)4.19.37-1medium
linuxsourcejessie3.16.68-1mediumDLA-1799-1
linuxsourcestretch4.9.168-1+deb9u5mediumDSA-4497-1
linux-4.9sourcejessie4.9.168-1+deb9u5~deb8u1mediumDLA-1885-1

Notes

https://www.openwall.com/lists/oss-security/2019/04/03/1
https://lore.kernel.org/lkml/155414977872.12780.13728555131525362206.stgit@gimli.home/T/#u
https://bugzilla.redhat.com/show_bug.cgi?id=1689426
Fixed by: https://git.kernel.org/linus/492855939bdb59c6f947b0b5b44af9ad82b7e38c

Search for package or bug name: Reporting problems