An infinite loop issue was found in the vhostnet kernel module in Linux Kernel up to and including v5.1-rc6, while handling incoming packets in handlerx(). It could occur if one end sends packets faster than the other end can process them. A guest user, maybe remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-3900.json"
[
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"327464426238889196584356981377188170857",
"101440083426345245943307776079864078702",
"7250392459027424826170198346713761490",
"198578184096973368507244918955991356980",
"64878472137351838729477951193816135030",
"228533533346215657256848981068494218350",
"79914218643195093118008160016509687952",
"2803191892239295761199252919223595615",
"266715588746707832470195593608590689531",
"63758289661390851376181848378551174631",
"332114947683028005329153520393101734533"
]
},
"source": "https://github.com/php/php-src/commit/845610d1b58fc3b9e4127c8fd277a9d56a9874c2",
"signature_type": "Line",
"id": "CVE-2019-3900-36002f5c",
"target": {
"file": "ext/standard/html.c"
}
}
]