SB2020123021 - openEuler 20.03 LTS update for dpdk



SB2020123021 - openEuler 20.03 LTS update for dpdk

Published: December 30, 2020

Security Bulletin ID SB2020123021
Severity
Medium
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Adjecent network
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Buffer overflow (CVE-ID: CVE-2020-14374)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the copy_data() function. A remote user on a guest OS can run a specially crafted program to trigger memory corruption vhost_crypto application and execute arbitrary code on the host system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-14375)

The vulnerability allows a remote user to compromise the host OS.

The vulnerability exists due to Virtio ring descriptors and the data they describe are in a region of memory accessible by from both the virtual machine and the host. An attacker with access to the guest OS can change the contents of the memory after vhost_crypto has validated it and execute arbitrary code on the host OS.


3) Buffer overflow (CVE-ID: CVE-2020-14376)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when copying iv_data from the VM guest memory into host memory. A remote user on the guest OS can  run a specially crafted program to trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


4) Out-of-bounds read (CVE-ID: CVE-2020-14377)

The vulnerability allows a remote user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition. A remote user on the guest OS can run a specially crafted program to trigger out-of-bounds read error and read contents of memory of the host OS.


5) Integer overflow (CVE-ID: CVE-2020-14378)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to integer overflow in the move_desc() function. A remote user on the guest OS can consume large amounts of CPU cycles and prevent other VMs or network tasks from being serviced by the busy DPDK lcore for an extended period.


Remediation

Install update from vendor's website.