Severity
6.1MEDIUM
EPSS
0.1%
top 74.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 11
Latest updateMay 13

Description

It was found that the net_dma code in tcp_recvmsg() in the 2.6.32 kernel as shipped in RHEL6 is thread-unsafe. So an unprivileged multi-threaded userspace application calling recvmsg() for the same network socket in parallel executed on ioatdma-enabled hardware with net_dma enabled can leak the memory, crash the host leading to a denial-of-service or cause a random memory corruption.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:HExploitability: 1.8 | Impact: 4.2

Affected Packages3 packages

CVEListV5the_linux_foundation/kernel2.6.32 as shipped in rhel-6
NVDlinux/linux_kernel2.6.32
Debianlinux< 3.13.4-1+3

Also affects: Enterprise Linux 6.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-hx7v-466q-33qj: It was found that the net_dma code in tcp_recvmsg() in the 22022-05-13
CVEList
CVE-2019-3837: It was found that the net_dma code in tcp_recvmsg() in the 22019-04-11
OSV
CVE-2019-3837: It was found that the net_dma code in tcp_recvmsg() in the 22019-04-11

📋Vendor Advisories

2
Red Hat
kernel: memory leak in tcp_recvmsg() with NET_DMA2019-04-03
Debian
CVE-2019-3837: linux - It was found that the net_dma code in tcp_recvmsg() in the 2.6.32 kernel as ship...2019

💬Community

1
Bugzilla
CVE-2019-3837 kernel: memory leak in tcp_recvmsg() with NET_DMA2019-02-18
CVE-2019-3837 (MEDIUM CVSS 6.1) | It was found that the net_dma code | cvebase.io