vulnerability
SUSE: CVE-2020-10725: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:L/Au:S/C:N/I:N/A:P) | May 18, 2020 | May 20, 2020 | Feb 4, 2022 |
Severity
4
CVSS
(AV:N/AC:L/Au:S/C:N/I:N/A:P)
Published
May 18, 2020
Added
May 20, 2020
Modified
Feb 4, 2022
Description
A flaw was found in DPDK version 19.11 and above that allows a malicious guest to cause a segmentation fault of the vhost-user backend application running on the host, which could result in a loss of connectivity for the other guests running on that host. This is caused by a missing validity check of the descriptor address in the function `virtio_dev_rx_batch_packed()`.
Solutions
suse-upgrade-dpdksuse-upgrade-dpdk-develsuse-upgrade-dpdk-docsuse-upgrade-dpdk-examplessuse-upgrade-dpdk-kmp-defaultsuse-upgrade-dpdk-thunderxsuse-upgrade-dpdk-thunderx-develsuse-upgrade-dpdk-thunderx-kmp-defaultsuse-upgrade-dpdk-toolssuse-upgrade-libdpdk-18_11suse-upgrade-libdpdk-20_0
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.