First published: Tue Apr 28 2020(Updated: )
A vulnerability was found in DPDK through version 18.11, The vhost crypto library code contains a post message handler (vhost_crypto_msg_post_handler) which calls vhost_crypto_create_sess() which in turn calls transform_cipher_param() depending on the operation type. It is transform_cipher_param() that handles the payload data. The payload contains a cipher key length and a static VHOST_USER_CRYPTO_MAX_CIPHER_KEY_LENGTH (64) byte key buffer. When transform_cipher_param() handles the payload data it does not check to see if the buffer length doesn't exceed VHOST_USER_CRYPTO_MAX_CIPHER_KEY_LENGTH. This missing check can cause out of bound reads which could trigger a crash or a potential information leak. Also, the vhost crypto library code contains a post message handler (vhost_crypto_msg_post_handler) which calls vhost_crypto_create_sess() which in turn calls transform_chain_param() depending on the operation type. It is transform_chain_param() that handles the payload data. The payload contains a cipher key length and a static VHOST_USER_CRYPTO_MAX_CIPHER_KEY_LENGTH (64) byte key buffer, it also contains a digest length and a static authentication key buffer (size: VHOST_USER_CRYPTO_MAX_HMAC_KEY_LENGTH(512)) and authentication key buffer length. None of these length values are validated. Which can lead to reading out of bound.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openvswitch2.11 | <0:2.11.0-54.20200327gita4efc59.el7fd | 0:2.11.0-54.20200327gita4efc59.el7fd |
redhat/openvswitch2.13 | <0:2.13.0-25.el8fd | 0:2.13.0-25.el8fd |
redhat/openvswitch2.11 | <0:2.11.0-54.20200327gita4efc59.el8fd | 0:2.11.0-54.20200327gita4efc59.el8fd |
redhat/openvswitch2.11 | <0:2.11.3-77.el7fd | 0:2.11.3-77.el7fd |
redhat/openvswitch-selinux-extra-policy | <0:1.0-17.el7fd | 0:1.0-17.el7fd |
redhat/ovn2.11 | <0:2.11.1-57.el7fd | 0:2.11.1-57.el7fd |
Dpdk Data Plane Development Kit | <=18.11 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
Canonical Ubuntu Linux | =20.04 | |
Fedoraproject Fedora | =32 | |
ubuntu/dpdk | <18.11.5-0ubuntu0.19.10.2 | 18.11.5-0ubuntu0.19.10.2 |
ubuntu/dpdk | <19.11.1-0ubuntu1.1 | 19.11.1-0ubuntu1.1 |
ubuntu/dpdk | <19.11.2<18.11.8<20.02.1 | 19.11.2 18.11.8 20.02.1 |
redhat/dpdk | <20.02.1 | 20.02.1 |
redhat/dpdk | <19.11.2 | 19.11.2 |
redhat/dkdk | <18.11.8 | 18.11.8 |
debian/dpdk | 18.11.11-1~deb10u1 18.11.11-1~deb10u2 20.11.10-1~deb11u1 20.11.6-1~deb11u1 22.11.4-1~deb12u1 23.11-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID for this DPDK vulnerability is CVE-2020-10724.
The severity of CVE-2020-10724 is medium, with a severity value of 5.1.
DPDK versions 18.11 and above are affected by this vulnerability.
To fix CVE-2020-10724, you need to update DPDK to version 20.02.1, 19.11.2, or 18.11.8.
Yes, you can find references for CVE-2020-10724 at the following links: [link1](https://www.openwall.com/lists/oss-security/2020/05/18/2), [link2](https://bugs.dpdk.org/show_bug.cgi?id=269), [link3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1837057).