BDU:2019-03630

Vulnerability from fstec - Published: 24.04.2019
VLAI Severity ?
Title
Уязвимость модуля vhost_net ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость модуля vhost_net ядра операционной системы Linux связана с неконтролируемым расходом ресурса при обработке входящих пакетов в handle_rx(). Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, вызвать отказ в обслуживании
Vendor
ООО «РусБИТех-Астра», Red Hat Inc., Canonical Ltd., Сообщество свободного программного обеспечения, Fedora Project, Novell Inc., Oracle Corp.
Software Name
Astra Linux Special Edition (запись в едином реестре российских программ №369), Red Hat Enterprise Linux, Ubuntu, Debian GNU/Linux, Fedora, Suse Linux Enterprise Desktop, SUSE Linux Enterprise Server for SAP Applications, SUSE Linux Enterprise Module for Basesystem, SUSE Linux Enterprise High Performance Computing, Oracle Linux, SUSE Linux Enterprise Module for Development Tools, Linux
Software Version
1.5 «Смоленск» (Astra Linux Special Edition), 6 (Red Hat Enterprise Linux), 7 (Red Hat Enterprise Linux), 16.04 LTS (Ubuntu), 9 (Debian GNU/Linux), 18.04 LTS (Ubuntu), 28 (Fedora), 12 SP3 (Suse Linux Enterprise Desktop), 12 SP4 (Suse Linux Enterprise Desktop), 12 SP2 (SUSE Linux Enterprise Server for SAP Applications), 12 SP3 (SUSE Linux Enterprise Server for SAP Applications), 12 SP4 (SUSE Linux Enterprise Server for SAP Applications), 15 GA (SUSE Linux Enterprise Module for Basesystem), 12 (SUSE Linux Enterprise High Performance Computing), 11 SP3 (SUSE Linux Enterprise Server for SAP Applications), 12 GA (SUSE Linux Enterprise Server for SAP Applications), 29 (Fedora), 19.04 (Ubuntu), 7 (Oracle Linux), 30 (Fedora), 7.4 EUS (Red Hat Enterprise Linux), 7.5 EUS (Red Hat Enterprise Linux), 8 (Debian GNU/Linux), 10 (Debian GNU/Linux), 8 (poppler) (Oracle Linux), 15 GA (SUSE Linux Enterprise Module for Development Tools), 6 (Oracle Linux), от 4.15 до 4.19.63 включительно (Linux), от 4.10 до 4.14.132 включительно (Linux), от 4.20 до 5.2 (Linux), от 4.0 до 4.4.190 включительно (Linux), от 4.5 до 4.9.189 включительно (Linux)
Possible Mitigations
Использование рекомендаций: Для linux: Обновление программного обеспечения до 4.9.168-1+deb9u5 или более поздней версии https://www.spinics.net/lists/kernel/msg3111012.html https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.133 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.64 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.191 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.190 Для Debian: Обновление программного обеспечения(пакета linux) до 4.9.168-1+deb9u5 или более поздней версии https://security-tracker.debian.org/tracker/CVE-2019-3900 Для Ubuntu: https://usn.ubuntu.com/4114-1/ https://usn.ubuntu.com/4115-1/ https://usn.ubuntu.com/4116-1/ https://usn.ubuntu.com/4117-1/ https://usn.ubuntu.com/4118-1/ https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3900.html Для программных продуктов Red Hat Inc.: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3900 https://access.redhat.com/security/cve/cve-2019-3900 Для Fedora: https://bugzilla.redhat.com/show_bug.cgi?id=1702940 Для Oracle: https://linux.oracle.com/cve/CVE-2019-3900.html Для SUSE: https://www.suse.com/security/cve/CVE-2019-3900/ Для Astra Linux: Обновление программного обеспечения(пакета linux) до 4.9.168-1+deb9u5 или более поздней версии
Reference
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html http://www.securityfocus.com/bid/108076 https://access.redhat.com/errata/RHSA-2019:1973 https://access.redhat.com/errata/RHSA-2019:2029 https://access.redhat.com/errata/RHSA-2019:2043 https://access.redhat.com/errata/RHSA-2019:3220 https://access.redhat.com/errata/RHSA-2019:3309 https://access.redhat.com/errata/RHSA-2019:3517 https://access.redhat.com/errata/RHSA-2019:3836 https://access.redhat.com/errata/RHSA-2019:3967 https://access.redhat.com/errata/RHSA-2019:4058 https://access.redhat.com/errata/RHSA-2020:0204 https://access.redhat.com/security/cve/cve-2019-3900 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3900 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.133 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.64 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.191 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.190 https://linux.oracle.com/cve/CVE-2019-3900.html https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYTZH6QCNITK7353S6RCRT2PQHZSDPXD/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RI3WXXM5URTZSR3RVEKO6MDXDFIKTZ5R/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TOFNJA5NNVXQ6AV6KGZB677JIVXAMJHT/ https://lore.kernel.org/lkml/1556177599-56248-1-git-send-email-jasowang@redhat.com/ https://lore.kernel.org/lkml/1558067392-11740-1-git-send-email-jasowang@redhat.com/ https://nvd.nist.gov/vuln/detail/CVE-2019-3900 https://seclists.org/bugtraq/2019/Aug/18 https://seclists.org/bugtraq/2019/Nov/11 https://security.netapp.com/advisory/ntap-20190517-0005/ https://security-tracker.debian.org/tracker/CVE-2019-3900 https://ubuntu.com/security/notices/USN-4114-1 https://ubuntu.com/security/notices/USN-4115-1 https://ubuntu.com/security/notices/USN-4116-1 https://ubuntu.com/security/notices/USN-4117-1 https://ubuntu.com/security/notices/USN-4118-1 https://usn.ubuntu.com/4114-1/ https://usn.ubuntu.com/4115-1/ https://usn.ubuntu.com/4116-1/ https://usn.ubuntu.com/4117-1/ https://usn.ubuntu.com/4118-1/ https://usn.ubuntu.com/usn/usn-4114-1 https://usn.ubuntu.com/usn/usn-4115-1 https://usn.ubuntu.com/usn/usn-4116-1 https://usn.ubuntu.com/usn/usn-4117-1 https://usn.ubuntu.com/usn/usn-4118-1 https://wiki.astralinux.ru/astra-linux-se15-bulletin-20201201SE15 https://www.cve.org/CVERecord?id=CVE-2019-3900 https://www.debian.org/security/2019/dsa-4497 https://www.oracle.com/security-alerts/cpuApr2021.html https://www.spinics.net/lists/kernel/msg3111012.htm https://www.spinics.net/lists/kernel/msg3111012.html https://www.suse.com/security/cve/CVE-2019-3900/
CWE
CWE-400, CWE-835

{
  "CVSS 2.0": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
  "CVSS 3.0": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
  "CVSS 4.0": null,
  "remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
  "remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
  "\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, Red Hat Inc., Canonical Ltd., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Fedora Project, Novell Inc., Oracle Corp.",
  "\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "1.5 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 6 (Red Hat Enterprise Linux), 7 (Red Hat Enterprise Linux), 16.04 LTS (Ubuntu), 9 (Debian GNU/Linux), 18.04 LTS (Ubuntu), 28 (Fedora), 12 SP3 (Suse Linux Enterprise Desktop), 12 SP4 (Suse Linux Enterprise Desktop), 12 SP2 (SUSE Linux Enterprise Server for SAP Applications), 12 SP3 (SUSE Linux Enterprise Server for SAP Applications), 12 SP4 (SUSE Linux Enterprise Server for SAP Applications), 15 GA (SUSE Linux Enterprise Module for Basesystem), 12 (SUSE Linux Enterprise High Performance Computing), 11 SP3 (SUSE Linux Enterprise Server for SAP Applications), 12 GA (SUSE Linux Enterprise Server for SAP Applications), 29 (Fedora), 19.04 (Ubuntu), 7 (Oracle Linux), 30 (Fedora), 7.4 EUS (Red Hat Enterprise Linux), 7.5 EUS (Red Hat Enterprise Linux), 8 (Debian GNU/Linux), 10 (Debian GNU/Linux), 8 (poppler) (Oracle Linux), 15 GA (SUSE Linux Enterprise Module for Development Tools), 6 (Oracle Linux), \u043e\u0442 4.15 \u0434\u043e 4.19.63 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.10 \u0434\u043e 4.14.132 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.20 \u0434\u043e 5.2 (Linux), \u043e\u0442 4.0 \u0434\u043e 4.4.190 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.5 \u0434\u043e 4.9.189 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux)",
  "\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f linux:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043e 4.9.168-1+deb9u5 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\n\nhttps://www.spinics.net/lists/kernel/msg3111012.html\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.133\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.64\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.191\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.190\n\n\n\n\u0414\u043b\u044f Debian:\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f(\u043f\u0430\u043a\u0435\u0442\u0430 linux) \u0434\u043e 4.9.168-1+deb9u5 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\nhttps://security-tracker.debian.org/tracker/CVE-2019-3900\n\n\n\n\u0414\u043b\u044f Ubuntu:\n\nhttps://usn.ubuntu.com/4114-1/\n\nhttps://usn.ubuntu.com/4115-1/\n\nhttps://usn.ubuntu.com/4116-1/\n\nhttps://usn.ubuntu.com/4117-1/\n\nhttps://usn.ubuntu.com/4118-1/\nhttps://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3900.html\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\n\nhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3900\nhttps://access.redhat.com/security/cve/cve-2019-3900\n\n\u0414\u043b\u044f Fedora:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1702940\n\n\u0414\u043b\u044f Oracle:\nhttps://linux.oracle.com/cve/CVE-2019-3900.html\n\n\u0414\u043b\u044f SUSE:\nhttps://www.suse.com/security/cve/CVE-2019-3900/\n\n\u0414\u043b\u044f Astra Linux:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f(\u043f\u0430\u043a\u0435\u0442\u0430 linux) \u0434\u043e 4.9.168-1+deb9u5 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438",
  "\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "24.04.2019",
  "\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "28.05.2024",
  "\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "16.10.2019",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2019-03630",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2019-3900",
  "\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
  "\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
  "\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Red Hat Enterprise Linux, Ubuntu, Debian GNU/Linux, Fedora, Suse Linux Enterprise Desktop, SUSE Linux Enterprise Server for SAP Applications, SUSE Linux Enterprise Module for Basesystem, SUSE Linux Enterprise High Performance Computing, Oracle Linux, SUSE Linux Enterprise Module for Development Tools, Linux",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.5 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb  (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Red Hat Inc. Red Hat Enterprise Linux 6 , Red Hat Inc. Red Hat Enterprise Linux 7 , Canonical Ltd. Ubuntu 16.04 LTS , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , Canonical Ltd. Ubuntu 18.04 LTS , Fedora Project Fedora 28 , Novell Inc. Suse Linux Enterprise Desktop 12 SP3 , Novell Inc. Suse Linux Enterprise Desktop 12 SP4 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP2 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP3 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP4 , Novell Inc. SUSE Linux Enterprise Module for Basesystem 15 GA , Novell Inc. SUSE Linux Enterprise High Performance Computing 12 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 11 SP3 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 GA , Fedora Project Fedora 29 , Canonical Ltd. Ubuntu 19.04 , Oracle Corp. Oracle Linux 7 , Fedora Project Fedora 30 , Red Hat Inc. Red Hat Enterprise Linux 7.4 EUS , Red Hat Inc. Red Hat Enterprise Linux 7.5 EUS , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 8 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u0434\u043e 5.1 , Oracle Corp. Oracle Linux 8 (poppler) , Novell Inc. SUSE Linux Enterprise Module for Development Tools 15 GA , Oracle Corp. Oracle Linux 6 ",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0434\u0443\u043b\u044f vhost_net \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
  "\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u044b\u0439 \u0440\u0430\u0441\u0445\u043e\u0434 \u0440\u0435\u0441\u0443\u0440\u0441\u0430 (\u00ab\u0418\u0441\u0442\u043e\u0449\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u00bb) (CWE-400), \u0412\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0446\u0438\u043a\u043b\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u043c \u0443\u0441\u043b\u043e\u0432\u0438\u0435\u043c \u0432\u044b\u0445\u043e\u0434\u0430 (\u0431\u0435\u0441\u043a\u043e\u043d\u0435\u0447\u043d\u044b\u0439 \u0446\u0438\u043a\u043b) (CWE-835)",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0434\u0443\u043b\u044f vhost_net \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u044b\u043c \u0440\u0430\u0441\u0445\u043e\u0434\u043e\u043c \u0440\u0435\u0441\u0443\u0440\u0441\u0430 \u043f\u0440\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u0432\u0445\u043e\u0434\u044f\u0449\u0438\u0445 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 \u0432 handle_rx(). \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
  "\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
  "\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
  "\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432",
  "\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html\nhttp://www.securityfocus.com/bid/108076\nhttps://access.redhat.com/errata/RHSA-2019:1973\nhttps://access.redhat.com/errata/RHSA-2019:2029\nhttps://access.redhat.com/errata/RHSA-2019:2043\nhttps://access.redhat.com/errata/RHSA-2019:3220\nhttps://access.redhat.com/errata/RHSA-2019:3309\nhttps://access.redhat.com/errata/RHSA-2019:3517\nhttps://access.redhat.com/errata/RHSA-2019:3836\nhttps://access.redhat.com/errata/RHSA-2019:3967\nhttps://access.redhat.com/errata/RHSA-2019:4058\nhttps://access.redhat.com/errata/RHSA-2020:0204\nhttps://access.redhat.com/security/cve/cve-2019-3900\nhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3900\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.133\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.64\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.191\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.190\nhttps://linux.oracle.com/cve/CVE-2019-3900.html\nhttps://lists.debian.org/debian-lts-announce/2019/08/msg00016.html\nhttps://lists.debian.org/debian-lts-announce/2019/08/msg00017.html\nhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYTZH6QCNITK7353S6RCRT2PQHZSDPXD/\nhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RI3WXXM5URTZSR3RVEKO6MDXDFIKTZ5R/\nhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TOFNJA5NNVXQ6AV6KGZB677JIVXAMJHT/\nhttps://lore.kernel.org/lkml/1556177599-56248-1-git-send-email-jasowang@redhat.com/\nhttps://lore.kernel.org/lkml/1558067392-11740-1-git-send-email-jasowang@redhat.com/\nhttps://nvd.nist.gov/vuln/detail/CVE-2019-3900\nhttps://seclists.org/bugtraq/2019/Aug/18\nhttps://seclists.org/bugtraq/2019/Nov/11\nhttps://security.netapp.com/advisory/ntap-20190517-0005/\nhttps://security-tracker.debian.org/tracker/CVE-2019-3900\nhttps://ubuntu.com/security/notices/USN-4114-1\nhttps://ubuntu.com/security/notices/USN-4115-1\nhttps://ubuntu.com/security/notices/USN-4116-1\nhttps://ubuntu.com/security/notices/USN-4117-1\nhttps://ubuntu.com/security/notices/USN-4118-1\nhttps://usn.ubuntu.com/4114-1/\nhttps://usn.ubuntu.com/4115-1/\nhttps://usn.ubuntu.com/4116-1/\nhttps://usn.ubuntu.com/4117-1/\nhttps://usn.ubuntu.com/4118-1/\nhttps://usn.ubuntu.com/usn/usn-4114-1\nhttps://usn.ubuntu.com/usn/usn-4115-1\nhttps://usn.ubuntu.com/usn/usn-4116-1\nhttps://usn.ubuntu.com/usn/usn-4117-1\nhttps://usn.ubuntu.com/usn/usn-4118-1\nhttps://wiki.astralinux.ru/astra-linux-se15-bulletin-20201201SE15\nhttps://www.cve.org/CVERecord?id=CVE-2019-3900\nhttps://www.debian.org/security/2019/dsa-4497\nhttps://www.oracle.com/security-alerts/cpuApr2021.html\nhttps://www.spinics.net/lists/kernel/msg3111012.htm\nhttps://www.spinics.net/lists/kernel/msg3111012.html\nhttps://www.suse.com/security/cve/CVE-2019-3900/",
  "\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
  "\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
  "\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-400, CWE-835",
  "\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,8)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,5)"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…