dpdk-19.11.3-1.el8
エラータID: AXSA:2021-1390:01
リリース日:
2021/02/04 Thursday - 12:22
題名:
dpdk-19.11.3-1.el8
影響のあるチャネル:
Asianux Server 8 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- dpdk の vhost_user_set_log_base() には整数オーバーフローのチェックがなく、
これによってメモリマップが要求よりも小さくなり、メモリ破損を引き起こす
可能性のある脆弱性があります。(CVE-2020-10722)
- dpdk には、特定の状況下でペイロードのインデックス整数がコピーされ、
uint16 に切り捨てられることで範囲外のインデックスが作成され、
メモリ破損を引き起こす可能性がある脆弱性があります。(CVE-2020-10723)
- dpdk は virtio_dev_rx_batch_packed() でディスクリプタアドレスの
妥当性チェックを行っていないため、悪意のあるゲストがホスト上で動作している
vhost-user のバックエンドアプリケーションのセグメンテーションフォールトを
引き起こし、ホスト上で動作している他のゲストへの接続を失わせる脆弱性があります。
(CVE-2020-10725)
- dpdk には vhost-user ソケットに直接アクセスできる悪意のあるコンテナが
VHOST_USER_GET_INFLIGHT_FD メッセージを送り続けることで、
リソース(ファイルディスクリプタと仮想メモリのデータ)リークを発生させ、
サービス拒否を引き起こす脆弱性があります。(CVE-2020-10726)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2020-10722
A vulnerability was found in DPDK versions 18.05 and above. A missing check for an integer overflow in vhost_user_set_log_base() could result in a smaller memory map than requested, possibly allowing memory corruption.
A vulnerability was found in DPDK versions 18.05 and above. A missing check for an integer overflow in vhost_user_set_log_base() could result in a smaller memory map than requested, possibly allowing memory corruption.
CVE-2020-10723
A memory corruption issue was found in DPDK versions 17.05 and above. This flaw is caused by an integer truncation on the index of a payload. Under certain circumstances, the index (a UInt) is copied and truncated into a uint16, which can lead to out of bound indexing and possible memory corruption.
A memory corruption issue was found in DPDK versions 17.05 and above. This flaw is caused by an integer truncation on the index of a payload. Under certain circumstances, the index (a UInt) is copied and truncated into a uint16, which can lead to out of bound indexing and possible memory corruption.
CVE-2020-10725
A flaw was found in DPDK version 19.11 and above that allows a malicious guest to cause a segmentation fault of the vhost-user backend application running on the host, which could result in a loss of connectivity for the other guests running on that host. This is caused by a missing validity check of the descriptor address in the function `virtio_dev_rx_batch_packed()`.
A flaw was found in DPDK version 19.11 and above that allows a malicious guest to cause a segmentation fault of the vhost-user backend application running on the host, which could result in a loss of connectivity for the other guests running on that host. This is caused by a missing validity check of the descriptor address in the function `virtio_dev_rx_batch_packed()`.
CVE-2020-10726
A vulnerability was found in DPDK versions 19.11 and above. A malicious container that has direct access to the vhost-user socket can keep sending VHOST_USER_GET_INFLIGHT_FD messages, causing a resource leak (file descriptors and virtual memory), which may result in a denial of service.
A vulnerability was found in DPDK versions 19.11 and above. A malicious container that has direct access to the vhost-user socket can keep sending VHOST_USER_GET_INFLIGHT_FD messages, causing a resource leak (file descriptors and virtual memory), which may result in a denial of service.
追加情報:
N/A
ダウンロード:
SRPMS
- dpdk-19.11.3-1.el8.src.rpm
MD5: 770fd98e2e4e645631cbec50cddeb304
SHA-256: 842db00ce45b8cb70f3f086521e5ec056c0cf7dd960d4635b016bbe0976a0a1a
Size: 11.89 MB
Asianux Server 8 for x86_64
- dpdk-19.11.3-1.el8.x86_64.rpm
MD5: 20ac1431cf8ff1117747750d51052402
SHA-256: 60b54adb3398d49694e37f89d6bafbb6bef0f671d5c11cc523a6113665d37926
Size: 2.13 MB - dpdk-devel-19.11.3-1.el8.x86_64.rpm
MD5: 22fd78c6930eb511e80020466318ecc9
SHA-256: a4beb6a485b457e5289224c35674b9a27e70296b01cc5f8b290df2937df64403
Size: 376.52 kB - dpdk-doc-19.11.3-1.el8.noarch.rpm
MD5: 43072b962f3cd4ee1546ad3f2356f188
SHA-256: 7e1aee205c7d70b0057afaffea2d88eea84c389e9610093363717c864bf33649
Size: 10.02 MB - dpdk-tools-19.11.3-1.el8.x86_64.rpm
MD5: 7e3be4a6f50d43182ebe34cb2d8aed66
SHA-256: be063325633a3751068bc0f21211bd4a6da38a1d5bd10b5db0482ce85cf05c1c
Size: 32.75 kB