CVE-2020-14376

NameCVE-2020-14376
DescriptionA flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A lack of bounds checking when copying iv_data from the VM guest memory into host memory can lead to a large buffer overflow. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)
Debian Bugs971269

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
dpdk (PTS)buster18.11.11-1~deb10u1fixed
buster (security)18.11.11-1~deb10u2fixed
bullseye (security), bullseye20.11.6-1~deb11u1fixed
bookworm, sid22.11.1-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
dpdksourcestretch(not affected)
dpdksourcebuster18.11.10-1~deb10u1
dpdksource(unstable)19.11.5-1971269

Notes

[stretch] - dpdk <not-affected> (vhost_crypto introduced in v18.05-rc1)
https://bugs.dpdk.org/show_bug.cgi?id=272
https://git.dpdk.org/dpdk-stable/commit/?id=7e7c75edc6351ecdc5b108ab2ff4be8852d9e090 (v18.11.10)
Introduced by: https://git.dpdk.org/dpdk-stable/commit/?id=3bb595ecd6829b4019f281d56036acf4d1ccddc2 (v18.05-rc1)

Search for package or bug name: Reporting problems