First published: Tue Apr 28 2020(Updated: )
A vulnerability was found in DPDK through version 19.11, A malicious container which has direct access to the vhost-user socket can keep sending VHOST_USER_GET_INFLIGHT_FD messages which may cause leaking resources until resulting a DoS. Leaking resources being both file descriptors and virtual memory.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openvswitch2.13 | <0:2.13.0-25.el8fd | 0:2.13.0-25.el8fd |
redhat/dpdk | <0:19.11.3-1.el8 | 0:19.11.3-1.el8 |
Dpdk Data Plane Development Kit | <=19.11 | |
Fedoraproject Fedora | =32 | |
openSUSE Leap | =15.1 | |
Oracle Enterprise Communications Broker | =3.1.0 | |
Oracle Enterprise Communications Broker | =3.2.0 | |
ubuntu/dpdk | <19.11.1-0ubuntu1.1 | 19.11.1-0ubuntu1.1 |
ubuntu/dpdk | <19.11.2<18.11.8<20.02.1 | 19.11.2 18.11.8 20.02.1 |
redhat/dpdk | <20.02.1 | 20.02.1 |
redhat/dpdk | <19.11.2 | 19.11.2 |
debian/dpdk | 18.11.11-1~deb10u1 18.11.11-1~deb10u2 20.11.10-1~deb11u1 20.11.6-1~deb11u1 22.11.4-1~deb12u1 23.11-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this DPDK vulnerability is CVE-2020-10726.
The severity of CVE-2020-10726 is medium.
DPDK versions 19.11 and above are affected by this vulnerability.
A malicious container with direct access to the vhost-user socket can exploit this vulnerability by sending VHOST_USER_GET_INFLIGHT_FD messages to cause a resource leak.
Yes, the recommended fix for CVE-2020-10726 is to upgrade to DPDK version 20.02.1 or apply the appropriate patches.