|
Message-ID: <73386a14-6e5a-83e4-051d-125b5c5fe5d9@intel.com> Date: Mon, 28 Sep 2020 16:23:53 +0100 From: Ferruh Yigit <ferruh.yigit@...el.com> To: dpdk-announce <announce@...k.org> Cc: security@...k.org, security-prerelease@...k.org, oss-security@...ts.openwall.com, "dev@...k.org" <dev@...k.org> Subject: DPDK security advisory for multiple vhost crypto issues A set of vulnerabilities are fixed in DPDK: - CVE-2020-14374 - CVE-2020-14375 - CVE-2020-14376 - CVE-2020-14377 - CVE-2020-14378 Some downstream stakeholders were warned in advance in order to coordinate the release of fixes and reduce the vulnerability window. Problem: A malicious guest can harm the host using vhost crypto, this includes executing code in host (VM Escape), reading host application memory space to guest and causing partially denial of service in the host. All users of the vhost library are strongly encouraged to upgrade as soon as possible. Thanks to "Ryan Hall <ryan.e.hall@...el.com>" for reporting the issues. Stable releases download links: DPDK 18.11.10 (LTS) http://fast.dpdk.org/rel/dpdk-18.11.10.tar.xz DPDK 19.11.5 (LTS) https://fast.dpdk.org/rel/dpdk-19.11.5.tar.xz Details: CVE: CVE-2020-14374 Bugzilla: https://bugs.dpdk.org/show_bug.cgi?id=272 Severity: 8.8 (High) CVSS scores: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Summary : Remote Code Execution in vhost_crypto (VM Escape) Reporter: Ryan Hall <ryan.e.hall@...el.com> CVE: CVE-2020-14375 Bugzilla: https://bugs.dpdk.org/show_bug.cgi?id=272 Severity: 7.8 (High) CVSS scores: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H Summary : Time-of-check time-of-use vulnerabilities throughout vhost_crypto.c Reporter: Ryan Hall <ryan.e.hall@...el.com> CVE: CVE-2020-14376 Bugzilla: https://bugs.dpdk.org/show_bug.cgi?id=272 Severity: 7.8 (High) CVSS scores: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H Summary : Buffer overflow copying iv_data from guest to host(prepare_sym_cipher_op & prepare_sym_chain_op) Reporter: Ryan Hall <ryan.e.hall@...el.com> CVE: CVE-2020-14377 Bugzilla: https://bugs.dpdk.org/show_bug.cgi?id=272 Severity: 7.1 (High) CVSS scores: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Summary: write_back_data buffer over read (cipher->para.dst_data_len & desc->len) Reporter: Ryan Hall <ryan.e.hall@...el.com> CVE: CVE-2020-14378 Bugzilla: https://bugs.dpdk.org/show_bug.cgi?id=272 Severity: 3.3 (Low) CVSS scores: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L Summary : Partial Denial of Service due to Integer Underflow Reporter: Ryan Hall <ryan.e.hall@...el.com> Commits: main repo (will be 20.11.0) https://git.dpdk.org/dpdk/commit/?id=57680e34498 https://git.dpdk.org/dpdk/commit/?id=5677e68c05d https://git.dpdk.org/dpdk/commit/?id=b2866f47336 https://git.dpdk.org/dpdk/commit/?id=409c47c7c5b https://git.dpdk.org/dpdk/commit/?id=e15b7c01120 https://git.dpdk.org/dpdk/commit/?id=2d962bb7365 DPDK 18.11.10 (LTS) https://git.dpdk.org/dpdk-stable/commit/?h=18.11&id=ab6314978567 https://git.dpdk.org/dpdk-stable/commit/?h=18.11&id=7a5af91f8bf4 https://git.dpdk.org/dpdk-stable/commit/?h=18.11&id=7e7c75edc635 https://git.dpdk.org/dpdk-stable/commit/?h=18.11&id=ff65dc28bc71 https://git.dpdk.org/dpdk-stable/commit/?h=18.11&id=75f8df70a2c8 https://git.dpdk.org/dpdk-stable/commit/?h=18.11&id=6e8a4da39e68 DPDK 19.11.5 (LTS) https://git.dpdk.org/dpdk-stable/commit/?h=19.11&id=3f2635c5a9c3 https://git.dpdk.org/dpdk-stable/commit/?h=19.11&id=81e969483020 https://git.dpdk.org/dpdk-stable/commit/?h=19.11&id=e4a7c14f0248 https://git.dpdk.org/dpdk-stable/commit/?h=19.11&id=319b498e4b16 https://git.dpdk.org/dpdk-stable/commit/?h=19.11&id=6a3a414698e4 https://git.dpdk.org/dpdk-stable/commit/?h=19.11&id=e2666ec24535 -- DPDK Security Team http://core.dpdk.org/security/
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.