NVIDIA’s distribution of the Data Plane Development Kit (MLNX_DPDK) contains a vulnerability in the network stack, where error recovery is not handled properly, which can allow a remote attacker to cause denial of service and some impact to data integrity and confidentiality.
The product receives input that is expected to specify a quantity (such as size or length), but it does not validate or incorrectly validates that the quantity has the required properties.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Data_plane_development_kit | Nvidia | 19.11_1.0.0 (including) | 20.11_5.0.0 (excluding) |
Fast Datapath for Red Hat Enterprise Linux 8 | RedHat | openvswitch2.13-0:2.13.0-193.3.el8fdp | * |
Fast Datapath for Red Hat Enterprise Linux 8 | RedHat | openvswitch2.17-0:2.17.0-37.4.el8fdp | * |
Fast Datapath for Red Hat Enterprise Linux 8 | RedHat | openvswitch2.15-0:2.15.0-113.3.el8fdp | * |
Fast Datapath for Red Hat Enterprise Linux 8 | RedHat | openvswitch2.16-0:2.16.0-89.3.el8fdp | * |
Fast Datapath for Red Hat Enterprise Linux 9 | RedHat | openvswitch2.17-0:2.17.0-32.4.el9fdp | * |
Red Hat Enterprise Linux 9 | RedHat | dpdk-2:21.11.2-1.el9_1 | * |
Dpdk | Ubuntu | devel | * |
Dpdk | Ubuntu | focal | * |
Dpdk | Ubuntu | jammy | * |
Dpdk | Ubuntu | kinetic | * |
Dpdk | Ubuntu | xenial | * |
Specified quantities include size, length, frequency, price, rate, number of operations, time, and others. Code may rely on specified quantities to allocate resources, perform calculations, control iteration, etc. When the quantity is not properly validated, then attackers can specify malicious quantities to cause excessive resource allocation, trigger unexpected failures, enable buffer overflows, etc.