CVE-2020-10725

A flaw was found in DPDK version 19.11 and above that allows a malicious guest to cause a segmentation fault of the vhost-user backend application running on the host, which could result in a loss of connectivity for the other guests running on that host. This is caused by a missing validity check of the descriptor address in the function `virtio_dev_rx_batch_packed()`.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.7 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
redhatCNA
7.7 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 70%
VendorProductVersion
dpdkdata_plane_development_kit
𝑥
≤ 19.11
opensuseleap
15.1
oracleenterprise_communications_broker
3.1.0
oracleenterprise_communications_broker
3.2.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
dpdk
bullseye
20.11.10-1~deb11u1
fixed
buster
not-affected
stretch
not-affected
bullseye (security)
20.11.6-1~deb11u1
fixed
bookworm
22.11.5-1~deb12u1
fixed
sid
23.11.2-2
fixed
trixie
23.11.2-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
dpdk
focal
Fixed 19.11.1-0ubuntu1.1
released
eoan
not-affected
bionic
not-affected
xenial
not-affected
trusty
dne