{"id":"CVE-2019-3882","details":"A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.","modified":"2026-04-16T04:35:42.840869474Z","published":"2019-04-24T16:29:02.450Z","related":["SUSE-SU-2019:1240-1","SUSE-SU-2019:1241-1","SUSE-SU-2019:1242-1","SUSE-SU-2019:1244-1","SUSE-SU-2019:1245-1","SUSE-SU-2019:1287-1","SUSE-SU-2019:1289-1","SUSE-SU-2019:1550-1","SUSE-SU-2019:2430-1","openSUSE-SU-2019:1404-1","openSUSE-SU-2019:1479-1","openSUSE-SU-2024:10728-1","openSUSE-SU-2024:13704-1"],"references":[{"type":"ADVISORY","url":"https://usn.ubuntu.com/3981-1/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2019/Aug/18"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20190517-0005/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3982-2/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2029"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3979-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3980-2/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3982-1/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3981-2/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4497"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2043"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3980-1/"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3882"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"3.10"}]},{"events":[{"introduced":"0"},{"last_affected":"4.14"}]},{"events":[{"introduced":"0"},{"last_affected":"4.18"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.10"}]},{"events":[{"introduced":"0"},{"last_affected":"19.04"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"42.3"}]},{"events":[{"introduced":"9.5"}]},{"events":[{"introduced":"7.2"}]},{"events":[{"introduced":"7.2"}]},{"events":[{"introduced":"7.2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-3882.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}