ALT-PU-2021-1176-1
Closed vulnerabilities
BDU:2020-03905
Уязвимость набора библиотек и драйверов для быстрой обработки пакетов dpdk, связанная с целочисленным переполнением значения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-03944
Уязвимость функции vhost_user_set_log_base набора библиотек и драйверов для быстрой обработки пакетов dpdk, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-03962
Уязвимость модуля vhost-crypto набора библиотек и драйверов для быстрой обработки пакетов dpdk, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-00722
Уязвимость модуля vhost-user набора библиотек и драйверов для быстрой обработки пакетов dpdk, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00723
Уязвимость функции virtio_dev_rx_batch_packed набора библиотек и драйверов для быстрой обработки пакетов dpdk, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-10722
A vulnerability was found in DPDK versions 18.05 and above. A missing check for an integer overflow in vhost_user_set_log_base() could result in a smaller memory map than requested, possibly allowing memory corruption.
- openSUSE-SU-2020:0693
- https://bugs.dpdk.org/show_bug.cgi?id=267
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10722
- FEDORA-2020-04e3d34451
- USN-4362-1
- https://www.openwall.com/lists/oss-security/2020/05/18/2
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- openSUSE-SU-2020:0693
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.openwall.com/lists/oss-security/2020/05/18/2
- USN-4362-1
- FEDORA-2020-04e3d34451
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10722
- https://bugs.dpdk.org/show_bug.cgi?id=267
Modified: 2024-11-21
CVE-2020-10723
A memory corruption issue was found in DPDK versions 17.05 and above. This flaw is caused by an integer truncation on the index of a payload. Under certain circumstances, the index (a UInt) is copied and truncated into a uint16, which can lead to out of bound indexing and possible memory corruption.
- openSUSE-SU-2020:0693
- https://bugs.dpdk.org/show_bug.cgi?id=268
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10723
- FEDORA-2020-04e3d34451
- USN-4362-1
- https://www.openwall.com/lists/oss-security/2020/05/18/2
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- openSUSE-SU-2020:0693
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.openwall.com/lists/oss-security/2020/05/18/2
- USN-4362-1
- FEDORA-2020-04e3d34451
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10723
- https://bugs.dpdk.org/show_bug.cgi?id=268
Modified: 2024-11-21
CVE-2020-10724
A vulnerability was found in DPDK versions 18.11 and above. The vhost-crypto library code is missing validations for user-supplied values, potentially allowing an information leak through an out-of-bounds memory read.
- openSUSE-SU-2020:0693
- https://bugs.dpdk.org/show_bug.cgi?id=269
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10724
- FEDORA-2020-04e3d34451
- USN-4362-1
- https://www.openwall.com/lists/oss-security/2020/05/18/2
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- openSUSE-SU-2020:0693
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.openwall.com/lists/oss-security/2020/05/18/2
- USN-4362-1
- FEDORA-2020-04e3d34451
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10724
- https://bugs.dpdk.org/show_bug.cgi?id=269
Modified: 2024-11-21
CVE-2020-10725
A flaw was found in DPDK version 19.11 and above that allows a malicious guest to cause a segmentation fault of the vhost-user backend application running on the host, which could result in a loss of connectivity for the other guests running on that host. This is caused by a missing validity check of the descriptor address in the function `virtio_dev_rx_batch_packed()`.
- openSUSE-SU-2020:0693
- https://bugs.dpdk.org/show_bug.cgi?id=270
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10725
- FEDORA-2020-04e3d34451
- https://www.openwall.com/lists/oss-security/2020/05/18/2
- https://www.oracle.com/security-alerts/cpujan2021.html
- openSUSE-SU-2020:0693
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.openwall.com/lists/oss-security/2020/05/18/2
- FEDORA-2020-04e3d34451
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10725
- https://bugs.dpdk.org/show_bug.cgi?id=270
Modified: 2024-11-21
CVE-2020-10726
A vulnerability was found in DPDK versions 19.11 and above. A malicious container that has direct access to the vhost-user socket can keep sending VHOST_USER_GET_INFLIGHT_FD messages, causing a resource leak (file descriptors and virtual memory), which may result in a denial of service.
- openSUSE-SU-2020:0693
- https://bugs.dpdk.org/show_bug.cgi?id=271
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10726
- FEDORA-2020-04e3d34451
- https://www.openwall.com/lists/oss-security/2020/05/18/2
- https://www.oracle.com/security-alerts/cpujan2021.html
- openSUSE-SU-2020:0693
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.openwall.com/lists/oss-security/2020/05/18/2
- FEDORA-2020-04e3d34451
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10726
- https://bugs.dpdk.org/show_bug.cgi?id=271
Modified: 2024-11-21
CVE-2020-14374
A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A flawed bounds checking in the copy_data function leads to a buffer overflow allowing an attacker in a virtual machine to write arbitrary data to any address in the vhost_crypto application. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- openSUSE-SU-2020:1593
- openSUSE-SU-2020:1593
- openSUSE-SU-2020:1599
- openSUSE-SU-2020:1599
- [oss-security] 20210104 Re: DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- https://bugzilla.redhat.com/show_bug.cgi?id=1879466
- https://bugzilla.redhat.com/show_bug.cgi?id=1879466
- https://www.openwall.com/lists/oss-security/2020/09/28/3
- https://www.openwall.com/lists/oss-security/2020/09/28/3
Modified: 2024-11-21
CVE-2020-14375
A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. Virtio ring descriptors, and the data they describe are in a region of memory accessible by from both the virtual machine and the host. An attacker in a VM can change the contents of the memory after vhost_crypto has validated it. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- openSUSE-SU-2020:1593
- openSUSE-SU-2020:1593
- openSUSE-SU-2020:1599
- openSUSE-SU-2020:1599
- [oss-security] 20210104 Re: DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- https://bugzilla.redhat.com/show_bug.cgi?id=1879468
- https://bugzilla.redhat.com/show_bug.cgi?id=1879468
- USN-4550-1
- USN-4550-1
- https://www.openwall.com/lists/oss-security/2020/09/28/3
- https://www.openwall.com/lists/oss-security/2020/09/28/3
Modified: 2024-11-21
CVE-2020-14376
A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A lack of bounds checking when copying iv_data from the VM guest memory into host memory can lead to a large buffer overflow. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- openSUSE-SU-2020:1593
- openSUSE-SU-2020:1593
- openSUSE-SU-2020:1599
- openSUSE-SU-2020:1599
- [oss-security] 20210104 Re: DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- https://bugzilla.redhat.com/show_bug.cgi?id=1879470
- https://bugzilla.redhat.com/show_bug.cgi?id=1879470
- USN-4550-1
- USN-4550-1
- https://www.openwall.com/lists/oss-security/2020/09/28/3
- https://www.openwall.com/lists/oss-security/2020/09/28/3
Modified: 2024-11-21
CVE-2020-14377
A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A complete lack of validation of attacker-controlled parameters can lead to a buffer over read. The results of the over read are then written back to the guest virtual machine memory. This vulnerability can be used by an attacker in a virtual machine to read significant amounts of host memory. The highest threat from this vulnerability is to data confidentiality and system availability.
- openSUSE-SU-2020:1593
- openSUSE-SU-2020:1593
- openSUSE-SU-2020:1599
- openSUSE-SU-2020:1599
- [oss-security] 20210104 Re: DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- https://bugzilla.redhat.com/show_bug.cgi?id=1879472
- https://bugzilla.redhat.com/show_bug.cgi?id=1879472
- USN-4550-1
- USN-4550-1
- https://www.openwall.com/lists/oss-security/2020/09/28/3
- https://www.openwall.com/lists/oss-security/2020/09/28/3
Modified: 2024-11-21
CVE-2020-14378
An integer underflow in dpdk versions before 18.11.10 and before 19.11.5 in the `move_desc` function can lead to large amounts of CPU cycles being eaten up in a long running loop. An attacker could cause `move_desc` to get stuck in a 4,294,967,295-count iteration loop. Depending on how `vhost_crypto` is being used this could prevent other VMs or network tasks from being serviced by the busy DPDK lcore for an extended period.
- openSUSE-SU-2020:1593
- openSUSE-SU-2020:1593
- openSUSE-SU-2020:1599
- openSUSE-SU-2020:1599
- [oss-security] 20210104 Re: DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- https://bugzilla.redhat.com/show_bug.cgi?id=1879473
- https://bugzilla.redhat.com/show_bug.cgi?id=1879473
- USN-4550-1
- USN-4550-1
- https://www.openwall.com/lists/oss-security/2020/09/28/3
- https://www.openwall.com/lists/oss-security/2020/09/28/3
Modified: 2024-11-21
CVE-2022-2132
A permissive list of allowed inputs flaw was found in DPDK. This issue allows a remote attacker to cause a denial of service triggered by sending a crafted Vhost header to DPDK.
- https://bugs.dpdk.org/show_bug.cgi?id=1031
- https://bugs.dpdk.org/show_bug.cgi?id=1031
- https://bugzilla.redhat.com/show_bug.cgi?id=2099475
- https://bugzilla.redhat.com/show_bug.cgi?id=2099475
- [debian-lts-announce] 20220902 [SECURITY] [DLA 3092-1] dpdk security update
- [debian-lts-announce] 20220902 [SECURITY] [DLA 3092-1] dpdk security update