Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 28 Sep 2020 16:23:53 +0100
From: Ferruh Yigit <>
To: dpdk-announce <>
Cc:,,, "" <>
Subject: DPDK security advisory for multiple vhost crypto issues

A set of vulnerabilities are fixed in DPDK:
- CVE-2020-14374
- CVE-2020-14375
- CVE-2020-14376
- CVE-2020-14377
- CVE-2020-14378

Some downstream stakeholders were warned in advance in order to coordinate the
release of fixes and reduce the vulnerability window.

A malicious guest can harm the host using vhost crypto, this includes
executing code in host (VM Escape), reading host application memory
space to guest and causing partially denial of service in the host.

All users of the vhost library are strongly encouraged to upgrade as soon as

Thanks to "Ryan Hall <>" for reporting the issues.

Stable releases download links:

DPDK 18.11.10 (LTS)

DPDK 19.11.5 (LTS)


CVE: CVE-2020-14374
Severity: 8.8 (High)
CVSS scores: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Summary : Remote Code Execution in vhost_crypto (VM Escape)
Reporter: Ryan Hall <>

CVE: CVE-2020-14375
Severity: 7.8 (High)
CVSS scores: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Summary : Time-of-check time-of-use vulnerabilities throughout vhost_crypto.c
Reporter: Ryan Hall <>

CVE: CVE-2020-14376
Severity: 7.8 (High)
CVSS scores: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Summary : Buffer overflow copying iv_data from guest to
           host(prepare_sym_cipher_op & prepare_sym_chain_op)
Reporter: Ryan Hall <>

CVE: CVE-2020-14377
Severity: 7.1 (High)
CVSS scores: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Summary: write_back_data buffer over read (cipher->para.dst_data_len &
Reporter: Ryan Hall <>

CVE: CVE-2020-14378
Severity: 3.3 (Low)
CVSS scores: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Summary : Partial Denial of Service due to Integer Underflow
Reporter: Ryan Hall <>

main repo (will be 20.11.0)

DPDK 18.11.10 (LTS)

DPDK 19.11.5 (LTS)

DPDK Security Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.