Bug 2099475 (CVE-2022-2132) - CVE-2022-2132 dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs
Summary: CVE-2022-2132 dpdk: DoS when a Vhost header crosses more than two descriptors...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2022-2132
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2102403 2102404 2102405 2102406 2102407 2102408 2102409 2102410 2102411 2102412 2102413 2102414 2102415 2102416 2102417 2102418 2102419 2102420 2104285 2104288 2104289 2104290 2104291 2104292 2104293 2104294 2104295 2107165 2107166 2107167 2107169 2107170 2107171 2107172 2107173 2122335 2126287 2155508
Blocks: 2099290 2122510
TreeView+ depends on / blocked
 
Reported: 2022-06-21 05:16 UTC by TEJ RATHI
Modified: 2023-07-06 16:23 UTC (History)
44 users (show)

Fixed In Version: dpdk 21.11, dpdk 20.11, dpdk 19.11
Doc Type: If docs needed, set a value
Doc Text:
A permissive list of allowed inputs flaw was found in DPDK. This issue allows a remote attacker to cause a denial of service triggered by sending a crafted Vhost header to DPDK.
Clone Of:
Environment:
Last Closed: 2022-12-05 21:33:23 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2022:6410 0 None None None 2022-09-12 01:33:31 UTC
Red Hat Product Errata RHBA-2022:6495 0 None None None 2022-09-13 11:29:32 UTC
Red Hat Product Errata RHBA-2022:6499 0 None None None 2022-09-13 16:43:03 UTC
Red Hat Product Errata RHBA-2023:0266 0 None None None 2023-01-19 09:12:41 UTC
Red Hat Product Errata RHBA-2023:0268 0 None None None 2023-01-19 11:53:14 UTC
Red Hat Product Errata RHSA-2022:6382 0 None None None 2022-09-07 16:04:50 UTC
Red Hat Product Errata RHSA-2022:6383 0 None None None 2022-09-07 16:04:29 UTC
Red Hat Product Errata RHSA-2022:6384 0 None None None 2022-09-07 16:04:05 UTC
Red Hat Product Errata RHSA-2022:6385 0 None None None 2022-09-07 16:03:39 UTC
Red Hat Product Errata RHSA-2022:6386 0 None None None 2022-09-07 15:53:59 UTC
Red Hat Product Errata RHSA-2022:6551 0 None None None 2022-09-19 11:50:25 UTC
Red Hat Product Errata RHSA-2022:6850 0 None None None 2022-10-06 18:30:55 UTC
Red Hat Product Errata RHSA-2022:7268 0 None None None 2022-11-01 09:55:07 UTC
Red Hat Product Errata RHSA-2022:8263 0 None None None 2022-11-15 10:46:32 UTC
Red Hat Product Errata RHSA-2023:0166 0 None None None 2023-01-16 09:14:11 UTC
Red Hat Product Errata RHSA-2023:0167 0 None None None 2023-01-16 09:11:37 UTC
Red Hat Product Errata RHSA-2023:0168 0 None None None 2023-01-16 09:12:43 UTC
Red Hat Product Errata RHSA-2023:0169 0 None None None 2023-01-16 09:19:08 UTC
Red Hat Product Errata RHSA-2023:0170 0 None None None 2023-01-16 09:19:56 UTC
Red Hat Product Errata RHSA-2023:0171 0 None None None 2023-01-16 09:24:32 UTC
Red Hat Product Errata RHSA-2023:0172 0 None None None 2023-01-16 09:18:41 UTC

Description TEJ RATHI 2022-06-21 05:16:43 UTC
In copy_desc_to_mbuf() function, the Vhost header was assumed not across more than two descriptors. If a malicious guest send a packet with the Vhost  header crossing more than two descriptors, the buf_avail will be a very large number near 4G. All the mbufs will be allocated, therefor other guests traffic will be blocked. A malicious guest can cause denial of service for the other guest running on the hypervisor.

https://bugs.dpdk.org/show_bug.cgi?id=1031

Comment 12 Anten Skrabec 2022-08-29 19:43:42 UTC
Created dpdk tracking bugs for this issue:

Affects: fedora-all [bug 2122335]

Comment 13 Jean-Tsung Hsiao 2022-09-01 15:16:52 UTC
Ran the following sanity tests to verify:

Selinux/netperf(ovs-dpfk-tunneling): https://beaker.engineering.redhat.com/jobs/6962774

RFC2544 PvP over ovs-dpdk/XXv710: 25.5 Mpps

Comment 14 Jean-Tsung Hsiao 2022-09-01 19:04:46 UTC
Below is the link to all vhostuser tests:

https://docs.google.com/spreadsheets/d/1EUbENq1LQsaUTcQLTQZCmmIrDvYMeDXgl1vEqjoF5kM/edit?usp=sharing

Comment 15 errata-xmlrpc 2022-09-07 15:53:56 UTC
This issue has been addressed in the following products:

  Fast Datapath for Red Hat Enterprise Linux 9

Via RHSA-2022:6386 https://access.redhat.com/errata/RHSA-2022:6386

Comment 16 errata-xmlrpc 2022-09-07 16:03:35 UTC
This issue has been addressed in the following products:

  Fast Datapath for Red Hat Enterprise Linux 8

Via RHSA-2022:6385 https://access.redhat.com/errata/RHSA-2022:6385

Comment 17 errata-xmlrpc 2022-09-07 16:04:01 UTC
This issue has been addressed in the following products:

  Fast Datapath for Red Hat Enterprise Linux 8

Via RHSA-2022:6384 https://access.redhat.com/errata/RHSA-2022:6384

Comment 18 errata-xmlrpc 2022-09-07 16:04:25 UTC
This issue has been addressed in the following products:

  Fast Datapath for Red Hat Enterprise Linux 8

Via RHSA-2022:6383 https://access.redhat.com/errata/RHSA-2022:6383

Comment 19 errata-xmlrpc 2022-09-07 16:04:46 UTC
This issue has been addressed in the following products:

  Fast Datapath for Red Hat Enterprise Linux 8

Via RHSA-2022:6382 https://access.redhat.com/errata/RHSA-2022:6382

Comment 22 errata-xmlrpc 2022-09-19 11:50:21 UTC
This issue has been addressed in the following products:

  Red Hat Virtualization 4 for Red Hat Enterprise Linux 8

Via RHSA-2022:6551 https://access.redhat.com/errata/RHSA-2022:6551

Comment 24 errata-xmlrpc 2022-10-06 18:30:52 UTC
This issue has been addressed in the following products:

  Fast Datapath for Red Hat Enterprise Linux 7

Via RHSA-2022:6850 https://access.redhat.com/errata/RHSA-2022:6850

Comment 25 errata-xmlrpc 2022-11-01 09:55:03 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 13.0 - ELS

Via RHSA-2022:7268 https://access.redhat.com/errata/RHSA-2022:7268

Comment 29 errata-xmlrpc 2022-11-15 10:46:30 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:8263 https://access.redhat.com/errata/RHSA-2022:8263

Comment 30 Product Security DevOps Team 2022-12-05 21:33:20 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-2132

Comment 33 errata-xmlrpc 2023-01-16 09:11:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Extras

Via RHSA-2023:0167 https://access.redhat.com/errata/RHSA-2023:0167

Comment 34 errata-xmlrpc 2023-01-16 09:12:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions

Via RHSA-2023:0168 https://access.redhat.com/errata/RHSA-2023:0168

Comment 35 errata-xmlrpc 2023-01-16 09:14:09 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support
  Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.2 Telecommunications Update Service

Via RHSA-2023:0166 https://access.redhat.com/errata/RHSA-2023:0166

Comment 36 errata-xmlrpc 2023-01-16 09:18:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2023:0172 https://access.redhat.com/errata/RHSA-2023:0172

Comment 37 errata-xmlrpc 2023-01-16 09:19:05 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Extended Update Support

Via RHSA-2023:0169 https://access.redhat.com/errata/RHSA-2023:0169

Comment 38 errata-xmlrpc 2023-01-16 09:19:53 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2023:0170 https://access.redhat.com/errata/RHSA-2023:0170

Comment 39 errata-xmlrpc 2023-01-16 09:24:29 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:0171 https://access.redhat.com/errata/RHSA-2023:0171


Note You need to log in before you can comment on or make changes to this bug.