Name | CVE-2020-14377 |
Description | A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A complete lack of validation of attacker-controlled parameters can lead to a buffer over read. The results of the over read are then written back to the guest virtual machine memory. This vulnerability can be used by an attacker in a virtual machine to read significant amounts of host memory. The highest threat from this vulnerability is to data confidentiality and system availability. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 971269 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
dpdk (PTS) | bullseye | 20.11.10-1~deb11u1 | fixed |
| bullseye (security) | 20.11.6-1~deb11u1 | fixed |
| bookworm | 22.11.6-1~deb12u1 | fixed |
| sid, trixie | 23.11.2-3 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
dpdk | source | stretch | (not affected) | | | |
dpdk | source | buster | 18.11.10-1~deb10u1 | | | |
dpdk | source | (unstable) | 19.11.5-1 | | | 971269 |
Notes
[stretch] - dpdk <not-affected> (vhost_crypto introduced in v18.05-rc1)
https://bugs.dpdk.org/show_bug.cgi?id=272
https://git.dpdk.org/dpdk-stable/commit/?id=7e7c75edc6351ecdc5b108ab2ff4be8852d9e090 (v18.11.10)
Introduced by: https://git.dpdk.org/dpdk-stable/commit/?id=3bb595ecd6829b4019f281d56036acf4d1ccddc2 (v18.05-rc1)