First published: Fri Nov 22 2024(Updated: )
From DPDK v21.05, DPDK Vhost library checksum offload feature introduced a security vulnerability enabling an untrusted or compromised guest to crash hypervisor's vSwitch by forging Virtio descriptors to cause out-of-bounds reads. Affected versions are only vulnerable if the Vhost-based application registers devices with the RTE_VHOST_USER_NET_COMPLIANT_OL_FLAGS flag.
Affected Software | Affected Version | How to fix |
---|---|---|
DPDK (Data Plane Development Kit) | >=21.05 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2327955 is critical due to the potential for untrusted guests to crash the hypervisor's vSwitch.
To fix REDHAT-BUG-2327955, it is recommended to upgrade to a patched version of DPDK that addresses this vulnerability.
DPDK versions starting from 21.05 are affected by REDHAT-BUG-2327955 if used with Vhost-based applications.
Exploiting REDHAT-BUG-2327955 could result in out-of-bounds reads that crash the hypervisor's vSwitch, affecting availability.
Currently, the most effective workaround for REDHAT-BUG-2327955 is to avoid using vulnerable Vhost-based applications until an upgrade is completed.