First published: Thu Apr 11 2019(Updated: )
An infinite loop issue was found in the vhost_net kernel module in Linux Kernel up to and including v5.1-rc6, while handling incoming packets in handle_rx(). It could occur if one end sends packets faster than the other end can process them. A guest user, maybe remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.32-754.24.2.el6 | 0:2.6.32-754.24.2.el6 |
redhat/kernel-rt | <0:3.10.0-1062.rt56.1022.el7 | 0:3.10.0-1062.rt56.1022.el7 |
redhat/kernel-alt | <0:4.14.0-115.10.1.el7a | 0:4.14.0-115.10.1.el7a |
redhat/kernel | <0:3.10.0-1062.el7 | 0:3.10.0-1062.el7 |
redhat/kernel | <0:3.10.0-693.61.1.el7 | 0:3.10.0-693.61.1.el7 |
redhat/kernel | <0:3.10.0-862.44.2.el7 | 0:3.10.0-862.44.2.el7 |
redhat/kernel | <0:3.10.0-957.38.1.el7 | 0:3.10.0-957.38.1.el7 |
redhat/kernel-rt | <0:4.18.0-147.rt24.93.el8 | 0:4.18.0-147.rt24.93.el8 |
redhat/kernel | <0:4.18.0-147.el8 | 0:4.18.0-147.el8 |
redhat/kernel | <0:4.18.0-80.15.1.el8_0 | 0:4.18.0-80.15.1.el8_0 |
Linux Kernel | <5.1 | |
Linux Kernel | =5.1-rc1 | |
Linux Kernel | =5.1-rc2 | |
Linux Kernel | =5.1-rc3 | |
Linux Kernel | =5.1-rc4 | |
Linux Kernel | =5.1-rc5 | |
Linux Kernel | =5.1-rc6 | |
Fedora | =29 | |
Fedora | =30 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Debian | =8.0 | |
Debian | =9.0 | |
Debian | =10.0 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =19.04 | |
NetApp Active IQ Unified Manager | >=9.5 | |
NetApp SolidFire & HCI Management Node | ||
NetApp SnapProtect | ||
NetApp SolidFire & HCI Storage Node | ||
NetApp Storage Replication Adapter | >=7.2 | |
NetApp VASA Provider | >=7.2 | |
NetApp Virtual Storage Console | >=7.2 | |
NetApp CN1610 | ||
NetApp CN1610 Firmware | ||
Oracle SD-WAN Edge | =8.2 | |
Linux Kernel | >=2.6.34<3.16.72 | |
Linux Kernel | >=3.17<4.4.191 | |
Linux Kernel | >=4.5<4.9.190 | |
Linux Kernel | >=4.10<4.14.133 | |
Linux Kernel | >=4.15<4.19.64 | |
Linux Kernel | >=4.20<5.2 | |
All of | ||
NetApp CN1610 | ||
NetApp CN1610 Firmware | ||
Fedora | =28 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-3900 has been assigned a severity rating of high due to the potential for an infinite loop in the vhost_net kernel module.
To fix CVE-2019-3900, upgrade to the recommended kernel versions listed in your Linux distribution's advisory.
CVE-2019-3900 may cause significant system performance degradation by putting the system into an infinite loop when handling incoming packets.
If your system is running a vulnerable version of the Linux Kernel or vhost_net module up to and including v5.1-rc6, it may be susceptible to CVE-2019-3900.
Yes, a remote attacker can exploit CVE-2019-3900 by sending packets more quickly than the kernel can process them, potentially leading to denial-of-service.