Resource Exhaustion Affecting kernel-doc package, versions <0:4.18.0-147.el8
Threat Intelligence
EPSS
0.37% (74th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL8-KERNELDOC-3540771
- published 26 Jul 2021
- disclosed 19 Mar 2019
Introduced: 19 Mar 2019
CVE-2019-3874 Open this link in a new tabHow to fix?
Upgrade RHEL:8
kernel-doc
to version 0:4.18.0-147.el8 or higher.
This issue was patched in RHSA-2019:3517
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-doc
package and not the kernel-doc
package as distributed by RHEL
.
See How to fix?
for RHEL:8
relevant fixed versions and status.
The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3874
- https://security.netapp.com/advisory/ntap-20190411-0003/
- https://access.redhat.com/security/cve/CVE-2019-3874
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
- https://access.redhat.com/errata/RHSA-2019:3517
- https://usn.ubuntu.com/3979-1/
- https://usn.ubuntu.com/3980-1/
- https://usn.ubuntu.com/3980-2/
- https://usn.ubuntu.com/3981-1/
- https://usn.ubuntu.com/3981-2/
- https://usn.ubuntu.com/3982-1/
- https://usn.ubuntu.com/3982-2/
- https://bugzilla.redhat.com/show_bug.cgi?id=1686373
- https://discuss.kubernetes.io/t/kubernetes-security-announcement-linux-kernel-memory-cgroups-escape-via-sctp-cve-2019-3874/5594
- https://lore.kernel.org/netdev/20190401113110.GA20717@hmswarspite.think-freely.org/T/#u
CVSS Scores
version 3.1