First published: Wed Sep 16 2020(Updated: )
A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A flawed bounds checking in the copy_data function leads to a buffer overflow allowing an attacker in a virtual machine to write arbitrary data to any address in the vhost_crypto application. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dpdk Data Plane Development Kit | >=18.02.1<18.11.10 | |
Dpdk Data Plane Development Kit | >=19.02<19.11.5 | |
Canonical Ubuntu Linux | =20.04 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
redhat/dpdk | <18.11.10 | 18.11.10 |
redhat/dpdk | <19.11.5 | 19.11.5 |
ubuntu/dpdk | <19.11.3-0ubuntu0.2 | 19.11.3-0ubuntu0.2 |
debian/dpdk | 20.11.10-1~deb11u1 20.11.6-1~deb11u1 22.11.5-1~deb12u1 23.11.1-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-14374.
CVE-2020-14374 has a severity rating of 8.8, which is classified as high.
CVE-2020-14374 affects dpdk versions before 18.11.10 and before 19.11.5.
CVE-2020-14374 allows an attacker in a virtual machine to write arbitrary data to any address in the vhost_crypto application.
Yes, you can find more information about CVE-2020-14374 in the following references: - [http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00004.html](http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00004.html) - [http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00006.html](http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00006.html) - [http://www.openwall.com/lists/oss-security/2021/01/04/1](http://www.openwall.com/lists/oss-security/2021/01/04/1)