CVE-2019-3900

An infinite loop issue was found in the vhost_net kernel module in Linux Kernel up to and including v5.1-rc6, while handling incoming packets in handle_rx(). It could occur if one end sends packets faster than the other end can process them. A guest user, maybe remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario.
References
Link Resource
https://www.spinics.net/lists/kernel/msg3111012.html Patch Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3900 Issue Tracking Patch
http://www.securityfocus.com/bid/108076 Third Party Advisory VDB Entry
https://security.netapp.com/advisory/ntap-20190517-0005/ Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1973 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2043 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2029 Third Party Advisory
https://www.debian.org/security/2019/dsa-4497 Third Party Advisory
https://seclists.org/bugtraq/2019/Aug/18 Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html Mailing List Third Party Advisory
https://usn.ubuntu.com/4114-1/ Third Party Advisory
https://usn.ubuntu.com/4117-1/ Third Party Advisory
https://usn.ubuntu.com/4116-1/ Third Party Advisory
https://usn.ubuntu.com/4115-1/ Third Party Advisory
https://usn.ubuntu.com/4118-1/ Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3220 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3517 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3309 Third Party Advisory
https://seclists.org/bugtraq/2019/Nov/11 Mailing List Patch
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html Patch Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3836 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3967 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:4058 Third Party Advisory
https://access.redhat.com/errata/RHSA-2020:0204 Third Party Advisory
https://www.oracle.com/security-alerts/cpuApr2021.html Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RI3WXXM5URTZSR3RVEKO6MDXDFIKTZ5R/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TOFNJA5NNVXQ6AV6KGZB677JIVXAMJHT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYTZH6QCNITK7353S6RCRT2PQHZSDPXD/
Configurations

Configuration 1

cpe:2.3:o:linux:linux_kernel:5.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.1:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.1:rc6:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapprotect:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager_for_vmware_vsphere:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:virtual_storage_console_for_vmware_vsphere:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap_for_vmware_vsphere:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:sd-wan_edge:8.2:*:*:*:*:*:*:*

Information

Published : 2019-04-25 03:29

Updated : 2023-02-12 11:38


NVD link : CVE-2019-3900

Mitre link : CVE-2019-3900

Products Affected
CWE