CVE-2019-3900

An infinite loop issue was found in the vhost_net kernel module in Linux Kernel up to and including v5.1-rc6, while handling incoming packets in handle_rx(). It could occur if one end sends packets faster than the other end can process them. A guest user, maybe remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario.
References
Link Resource
https://www.spinics.net/lists/kernel/msg3111012.html Patch Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3900 Issue Tracking Patch Third Party Advisory
http://www.securityfocus.com/bid/108076 Third Party Advisory VDB Entry
https://security.netapp.com/advisory/ntap-20190517-0005/ Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1973 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2043 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2029 Third Party Advisory
https://www.debian.org/security/2019/dsa-4497 Third Party Advisory
https://seclists.org/bugtraq/2019/Aug/18 Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html Mailing List Third Party Advisory
https://usn.ubuntu.com/4114-1/ Third Party Advisory
https://usn.ubuntu.com/4117-1/ Third Party Advisory
https://usn.ubuntu.com/4116-1/ Third Party Advisory
https://usn.ubuntu.com/4115-1/ Third Party Advisory
https://usn.ubuntu.com/4118-1/ Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3220 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3517 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3309 Third Party Advisory
https://seclists.org/bugtraq/2019/Nov/11 Mailing List Patch Third Party Advisory
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html Patch Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2019:3836 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3967 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:4058 Third Party Advisory
https://access.redhat.com/errata/RHSA-2020:0204 Third Party Advisory
https://www.oracle.com/security-alerts/cpuApr2021.html Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RI3WXXM5URTZSR3RVEKO6MDXDFIKTZ5R/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TOFNJA5NNVXQ6AV6KGZB677JIVXAMJHT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYTZH6QCNITK7353S6RCRT2PQHZSDPXD/
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:5.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.1:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.1:rc6:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapprotect:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager_for_vmware_vsphere:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:virtual_storage_console_for_vmware_vsphere:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap_for_vmware_vsphere:*:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:netapp:cn1610_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:cn1610:-:*:*:*:*:*:*:*

Configuration 8 (hide)

cpe:2.3:a:oracle:sd-wan_edge:8.2:*:*:*:*:*:*:*

Information

Published : 2019-04-25 08:29

Updated : 2023-02-12 15:38


NVD link : CVE-2019-3900

Mitre link : CVE-2019-3900


JSON object : View

CWE
CWE-835

Loop with Unreachable Exit Condition ('Infinite Loop')

Advertisement

dedicated server usa

Products Affected

netapp

  • vasa_provider_for_clustered_data_ontap
  • storage_replication_adapter_for_clustered_data_ontap_for_vmware_vsphere
  • cn1610
  • solidfire
  • hci_management_node
  • active_iq_unified_manager_for_vmware_vsphere
  • virtual_storage_console_for_vmware_vsphere
  • cn1610_firmware
  • snapprotect

redhat

  • enterprise_linux

oracle

  • sd-wan_edge

fedoraproject

  • fedora

canonical

  • ubuntu_linux

linux

  • linux_kernel

debian

  • debian_linux