dpdk is vulnerable to arbitrary code execution. A buffer overflow vulnerability exists when copying iv_data
from guest.
CPE | Name | Operator | Version |
---|---|---|---|
dpdk:focal | eq | 19.11.3-0ubuntu0.1 | |
dpdk:focal | eq | 19.11.1-0ubuntu1.1 | |
dpdk:focal | eq | 19.11.1-0ubuntu1 | |
dpdk:buster | eq | 18.11.8-1~deb10u1 |
lists.opensuse.org/opensuse-security-announce/2020-10/msg00004.html
lists.opensuse.org/opensuse-security-announce/2020-10/msg00006.html
www.openwall.com/lists/oss-security/2021/01/04/1
www.openwall.com/lists/oss-security/2021/01/04/2
www.openwall.com/lists/oss-security/2021/01/04/5
bugzilla.redhat.com/show_bug.cgi?id=1879470
people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-14376.html
usn.ubuntu.com/4550-1/
www.openwall.com/lists/oss-security/2020/09/28/3
www.suse.com/security/cve/CVE-2020-14376/