CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
78.7%
A flaw was found in all dpdk version 17.x.x before 17.11.8, 16.x.x before 16.11.10, 18.x.x before 18.11.4 and 19.x.x before 19.08.1 where a malicious master, or a container with access to vhost_user socket, can send specially crafted VRING_SET_NUM messages, resulting in a memory leak including file descriptors. This flaw could lead to a denial of service condition.
Vendor | Product | Version | CPE |
---|---|---|---|
dpdk | data_plane_development_kit | * | cpe:2.3:a:dpdk:data_plane_development_kit:*:*:*:*:*:*:*:* |
redhat | enterprise_linux_fast_datapath | 7.0 | cpe:2.3:a:redhat:enterprise_linux_fast_datapath:7.0:*:*:*:*:*:*:* |
redhat | enterprise_linux_fast_datapath | 8.0 | cpe:2.3:a:redhat:enterprise_linux_fast_datapath:8.0:*:*:*:*:*:*:* |
redhat | openstack | 10 | cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:* |
redhat | virtualization_eus | 4.2 | cpe:2.3:a:redhat:virtualization_eus:4.2:*:*:*:*:*:*:* |
fedoraproject | fedora | 31 | cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* |
access.redhat.com/errata/RHSA-2020:0165
access.redhat.com/errata/RHSA-2020:0166
access.redhat.com/errata/RHSA-2020:0168
access.redhat.com/errata/RHSA-2020:0171
access.redhat.com/errata/RHSA-2020:0172
bugs.dpdk.org/show_bug.cgi?id=363
bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14818
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ULJ3C7OVBOEVDGSHYC3VCLSUHANGTFFP/
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
78.7%