CVE-2019-3837 PUBLISHED

It was found that the net_dma code in tcp_recvmsg() in the 2.6.32 kernel as shipped in RHEL6 is thread-unsafe. So an unprivileged multi-threaded userspace application calling recvmsg() for the same network socket in parallel executed on ioatdma-enabled hardware with net_dma enabled can leak the memory, crash the host leading to a denial-of-service or cause a random memory corruption.

EPSS 0.09% · 26.0th percentile

Risk Scores

EPSS Score
0.09%
26.0th percentile

Affected Products

VendorProductVersions
Ubuntu:14.04:LTSlinux0, 3.11.0-12.19, 3.12.0-1.3

Timeline

References

Open in Interactive Console →