Rapid7 Vulnerability & Exploit Database

SUSE: CVE-2020-14377: SUSE Linux Security Advisory

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

SUSE: CVE-2020-14377: SUSE Linux Security Advisory

Severity
4
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:P)
Published
09/28/2020
Created
09/30/2020
Added
09/29/2020
Modified
10/22/2021

Description

A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A complete lack of validation of attacker-controlled parameters can lead to a buffer over read. The results of the over read are then written back to the guest virtual machine memory. This vulnerability can be used by an attacker in a virtual machine to read significant amounts of host memory. The highest threat from this vulnerability is to data confidentiality and system availability.

Solution(s)

  • suse-upgrade-dpdk
  • suse-upgrade-dpdk-devel
  • suse-upgrade-dpdk-doc
  • suse-upgrade-dpdk-examples
  • suse-upgrade-dpdk-kmp-default
  • suse-upgrade-dpdk-kmp-preempt
  • suse-upgrade-dpdk-thunderx
  • suse-upgrade-dpdk-thunderx-devel
  • suse-upgrade-dpdk-thunderx-kmp-default
  • suse-upgrade-dpdk-tools
  • suse-upgrade-libdpdk-18_11
  • suse-upgrade-libdpdk-20_0

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;