Bug 2327955 (CVE-2024-11614)
| Summary: | CVE-2024-11614 dpdk: Denial Of Service from malicious guest on hypervisors using DPDK Vhost library | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
| Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
| Status: | NEW --- | QA Contact: | |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | unspecified | CC: | echaudro, fleitner, jiqiu, ktraynor, maxime.coquelin, security-response-team, trathi, tredaelli |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: |
An out-of-bounds read vulnerability was found in DPDK's Vhost library checksum offload feature. This issue enables an untrusted or compromised guest to crash the hypervisor's vSwitch by forging Virtio descriptors to cause out-of-bounds reads. This flaw allows an attacker with a malicious VM using a virtio driver to cause the vhost-user side to crash by sending a packet with a Tx checksum offload request and an invalid csum_start offset.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2335036, 2335035 | ||
| Bug Blocks: | |||
| Deadline: | 2024-12-17 | ||
|
Description
OSIDB Bzimport
2024-11-22 04:24:53 UTC
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2025:0211 https://access.redhat.com/errata/RHSA-2025:0211 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:0210 https://access.redhat.com/errata/RHSA-2025:0210 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2025:0208 https://access.redhat.com/errata/RHSA-2025:0208 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:0209 https://access.redhat.com/errata/RHSA-2025:0209 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2025:0221 https://access.redhat.com/errata/RHSA-2025:0221 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2025:0220 https://access.redhat.com/errata/RHSA-2025:0220 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:0222 https://access.redhat.com/errata/RHSA-2025:0222 This issue has been addressed in the following products: Fast Datapath for Red Hat Enterprise Linux 9 Via RHSA-2025:3963 https://access.redhat.com/errata/RHSA-2025:3963 This issue has been addressed in the following products: Fast Datapath for Red Hat Enterprise Linux 9 Via RHSA-2025:3964 https://access.redhat.com/errata/RHSA-2025:3964 This issue has been addressed in the following products: Fast Datapath for Red Hat Enterprise Linux 8 Via RHSA-2025:3970 https://access.redhat.com/errata/RHSA-2025:3970 This issue has been addressed in the following products: Fast Datapath for Red Hat Enterprise Linux 9 Via RHSA-2025:3965 https://access.redhat.com/errata/RHSA-2025:3965 |