First published: Wed Sep 16 2020(Updated: )
A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A complete lack of validation of attacker-controlled parameters can lead to a buffer over read. The results of the over read are then written back to the guest virtual machine memory. This vulnerability can be used by an attacker in a virtual machine to read significant amounts of host memory. The highest threat from this vulnerability is to data confidentiality and system availability.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dpdk Data Plane Development Kit | >=18.02.1<18.11.10 | |
Dpdk Data Plane Development Kit | >=19.02<19.11.5 | |
Canonical Ubuntu Linux | =20.04 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
redhat/dpdk | <18.11.10 | 18.11.10 |
redhat/dpdk | <19.11.5 | 19.11.5 |
ubuntu/dpdk | <19.11.3-0ubuntu0.2 | 19.11.3-0ubuntu0.2 |
debian/dpdk | 20.11.10-1~deb11u1 20.11.6-1~deb11u1 22.11.5-1~deb12u1 23.11.1-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw in dpdk is CVE-2020-14377.
The severity of CVE-2020-14377 is high with a CVSS score of 7.1.
CVE-2020-14377 can lead to a buffer over read in dpdk, allowing an attacker to write data back to the guest virtual machine memory.
Versions before 18.11.10 and before 19.11.5 of dpdk are affected by CVE-2020-14377.
To fix the vulnerability CVE-2020-14377, update dpdk to version 18.11.10 or 19.11.5, or later.