### [CVE-2019-3882](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882) ![](https://img.shields.io/static/v1?label=Product&message=kernel&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%203.10%2C%204.14%2C%204.18%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-770&color=brighgreen) ### Description A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon