An infinite loop issue was found in the vhost_net kernel module in Linux Kernel up to and including v5.1-rc6, while handling incoming packets in handle_rx(). It could occur if one end sends packets faster than the other end can process them. A guest user, maybe remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario.

Project Subscriptions

Vendors Products
Canonical Subscribe
Ubuntu Linux Subscribe
Debian Linux Subscribe
Fedoraproject Subscribe
Linux Kernel Subscribe
Active Iq Unified Manager For Vmware Vsphere Subscribe
Cn1610 Firmware Subscribe
Hci Management Node Subscribe
Snapprotect Subscribe
Solidfire Subscribe
Storage Replication Adapter For Clustered Data Ontap For Vmware Vsphere Subscribe
Vasa Provider For Clustered Data Ontap Subscribe
Virtual Storage Console For Vmware Vsphere Subscribe
Sd-wan Edge Subscribe
Enterprise Linux Subscribe
Rhel Aus Subscribe
Rhel E4s Subscribe
Rhel Eus Subscribe
Rhel Extras Rt Subscribe
Rhel Tus Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1884-1 linux security update
Debian DLA Debian DLA DLA-1885-1 linux-4.9 security update
Debian DSA Debian DSA DSA-4497-1 linux security update
EUVD EUVD EUVD-2019-13508 An infinite loop issue was found in the vhost_net kernel module in Linux Kernel up to and including v5.1-rc6, while handling incoming packets in handle_rx(). It could occur if one end sends packets faster than the other end can process them. A guest user, maybe remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario.
Ubuntu USN Ubuntu USN USN-4114-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-4115-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-4116-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-4117-1 Linux kernel (AWS) vulnerabilities
Ubuntu USN Ubuntu USN USN-4118-1 Linux kernel (AWS) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html cve-icon cve-icon
http://www.securityfocus.com/bid/108076 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:1973 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:2029 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:2043 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3220 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3309 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3517 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3836 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3967 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:4058 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2020:0204 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3900 cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYTZH6QCNITK7353S6RCRT2PQHZSDPXD/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RI3WXXM5URTZSR3RVEKO6MDXDFIKTZ5R/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TOFNJA5NNVXQ6AV6KGZB677JIVXAMJHT/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2019-3900 cve-icon
https://seclists.org/bugtraq/2019/Aug/18 cve-icon cve-icon
https://seclists.org/bugtraq/2019/Nov/11 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20190517-0005/ cve-icon cve-icon
https://usn.ubuntu.com/4114-1/ cve-icon cve-icon
https://usn.ubuntu.com/4115-1/ cve-icon cve-icon
https://usn.ubuntu.com/4116-1/ cve-icon cve-icon
https://usn.ubuntu.com/4117-1/ cve-icon cve-icon
https://usn.ubuntu.com/4118-1/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2019-3900 cve-icon
https://www.debian.org/security/2019/dsa-4497 cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuApr2021.html cve-icon cve-icon
https://www.spinics.net/lists/kernel/msg3111012.html cve-icon cve-icon
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-04T19:26:26.695Z

Reserved: 2019-01-03T00:00:00

Link: CVE-2019-3900

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-04-25T15:29:00.407

Modified: 2024-11-21T04:42:49.557

Link: CVE-2019-3900

cve-icon Redhat

Severity : Important

Publid Date: 2019-04-25T00:00:00Z

Links: CVE-2019-3900 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses