First published: Tue Apr 28 2020(Updated: )
A vulnerability was found in DPDK through version 18.11, vhost_user_set_log_base() is a message handler that is called to handle the VHOST_USER_SET_LOG_BASE message. Its payload contains a 64 bit size and offset. Both are added up and used as a size when calling mmap(). There is no integer overflow check. If an integer overflow occurs a smaller memory map would be created than requested. Since the returned mapping is mapped as writable and used for logging, it seems highly likely that memory corruption can occur.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openvswitch2.11 | <0:2.11.0-54.20200327gita4efc59.el7fd | 0:2.11.0-54.20200327gita4efc59.el7fd |
redhat/openvswitch | <0:2.9.0-130.el7fd | 0:2.9.0-130.el7fd |
redhat/openvswitch2.13 | <0:2.13.0-25.el8fd | 0:2.13.0-25.el8fd |
redhat/openvswitch2.11 | <0:2.11.0-54.20200327gita4efc59.el8fd | 0:2.11.0-54.20200327gita4efc59.el8fd |
redhat/dpdk | <0:18.11.8-1.el7_8 | 0:18.11.8-1.el7_8 |
redhat/dpdk | <0:19.11.3-1.el8 | 0:19.11.3-1.el8 |
redhat/openvswitch2.11 | <0:2.11.3-77.el7fd | 0:2.11.3-77.el7fd |
redhat/openvswitch-selinux-extra-policy | <0:1.0-17.el7fd | 0:1.0-17.el7fd |
redhat/ovn2.11 | <0:2.11.1-57.el7fd | 0:2.11.1-57.el7fd |
redhat/ovn2.11 | <0:2.11.1-44.el7fd | 0:2.11.1-44.el7fd |
Dpdk Data Plane Development Kit | <=18.05 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
Canonical Ubuntu Linux | =20.04 | |
Fedoraproject Fedora | =32 | |
openSUSE Leap | =15.1 | |
Oracle Communications Session Border Controller | >=8.2<=8.4 | |
Oracle Enterprise Communications Broker | =3.1.0 | |
Oracle Enterprise Communications Broker | =3.2.0 | |
ubuntu/dpdk | <17.11.9-0ubuntu18.04.2 | 17.11.9-0ubuntu18.04.2 |
ubuntu/dpdk | <18.11.5-0ubuntu0.19.10.2 | 18.11.5-0ubuntu0.19.10.2 |
ubuntu/dpdk | <19.11.1-0ubuntu1.1 | 19.11.1-0ubuntu1.1 |
ubuntu/dpdk | <19.11.2<18.11.8<20.02.1 | 19.11.2 18.11.8 20.02.1 |
redhat/dpdk | <20.02.1 | 20.02.1 |
redhat/dpdk | <19.11.2 | 19.11.2 |
redhat/dpdk | <18.11.8 | 18.11.8 |
debian/dpdk | 18.11.11-1~deb10u1 18.11.11-1~deb10u2 20.11.10-1~deb11u1 20.11.6-1~deb11u1 22.11.4-1~deb12u1 23.11-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2020-10722.
CVE-2020-10722 has a severity level of medium.
DPDK versions 18.05 and above are affected by CVE-2020-10722.
Update DPDK to version 20.02.1, 19.11.2, or 18.11.8 to fix CVE-2020-10722.
Yes, you can find references for CVE-2020-10722 at the following links: [http://git.dpdk.org/dpdk/commit/?id=fbc4d248b198db7f720fe31a47050a406632cc7a](http://git.dpdk.org/dpdk/commit/?id=fbc4d248b198db7f720fe31a47050a406632cc7a), [https://www.openwall.com/lists/oss-security/2020/05/18/2](https://www.openwall.com/lists/oss-security/2020/05/18/2), [https://bugs.dpdk.org/show_bug.cgi?id=267](https://bugs.dpdk.org/show_bug.cgi?id=267).