Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2023-5366
Disclosure Date: October 06, 2023 (last updated October 13, 2023)
A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.
0
Attacker Value
Unknown
CVE-2022-2132
Disclosure Date: August 31, 2022 (last updated October 08, 2023)
A permissive list of allowed inputs flaw was found in DPDK. This issue allows a remote attacker to cause a denial of service triggered by sending a crafted Vhost header to DPDK.
0
Attacker Value
Unknown
CVE-2021-3905
Disclosure Date: August 23, 2022 (last updated October 08, 2023)
A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments.
0
Attacker Value
Unknown
CVE-2021-3839
Disclosure Date: August 23, 2022 (last updated October 08, 2023)
A flaw was found in the vhost library in DPDK. Function vhost_user_set_inflight_fd() does not validate `msg->payload.inflight.num_queues`, possibly causing out-of-bounds memory read/write. Any software using DPDK vhost library may crash as a result of this vulnerability.
0
Attacker Value
Unknown
CVE-2019-14818
Disclosure Date: November 14, 2019 (last updated November 08, 2023)
A flaw was found in all dpdk version 17.x.x before 17.11.8, 16.x.x before 16.11.10, 18.x.x before 18.11.4 and 19.x.x before 19.08.1 where a malicious master, or a container with access to vhost_user socket, can send specially crafted VRING_SET_NUM messages, resulting in a memory leak including file descriptors. This flaw could lead to a denial of service condition.
0
Attacker Value
Unknown
CVE-2018-1059
Disclosure Date: April 24, 2018 (last updated November 26, 2024)
The DPDK vhost-user interface does not check to verify that all the requested guest physical range is mapped and contiguous when performing Guest Physical Addresses to Host Virtual Addresses translations. This may lead to a malicious guest exposing vhost-user backend process memory. All versions before 18.02.1 are vulnerable.
0