Bug 1202903 - (CVE-2022-2132) VUL-0: CVE-2022-2132: dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs
(CVE-2022-2132)
VUL-0: CVE-2022-2132: dpdk: DoS when a Vhost header crosses more than two des...
Status: NEW
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Major
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/341038/
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2022-08-30 09:32 UTC by Thomas Leroy
Modified: 2022-12-02 16:38 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Leroy 2022-08-30 09:32:05 UTC
rh#2099475

In copy_desc_to_mbuf() function, the Vhost header was assumed not across more than two descriptors. If a malicious guest send a packet with the Vhost  header crossing more than two descriptors, the buf_avail will be a very large number near 4G. All the mbufs will be allocated, therefor other guests traffic will be blocked. A malicious guest can cause denial of service for the other guest running on the hypervisor.

Upstream fix:
https://github.com/DPDK/dpdk/commit/dc1516e260a0df272b218392faf6db3cbf45e717

https://bugs.dpdk.org/show_bug.cgi?id=1031

References:
https://bugzilla.redhat.com/show_bug.cgi?id=2099475
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2132
https://seclists.org/oss-sec/2022/q3/153
Comment 1 Thomas Leroy 2022-08-30 10:01:24 UTC
This commit is also needed:
https://github.com/DPDK/dpdk/commit/71bd0cc536ad6d84188d947d6f24c17400d8f623

Affected:
- SUSE:SLE-12-SP5:Update
- SUSE:SLE-15:Update
- SUSE:SLE-15-SP1:Update 
- SUSE:SLE-15-SP2:Update
- SUSE:SLE-15-SP3:Update 
- SUSE:SLE-15-SP4:Update
- openSUSE:Factory
Comment 2 Petr Gajdos 2022-09-12 15:28:47 UTC
Submitted for: 15sp4,15sp2,15sp1,15,12sp5/dpdk.

I get a build failure for 15sp3 which I do not know how to fix sofar:

[  416s] make[8]: *** [/usr/src/linux-5.3.18-150300.59.90/scripts/Makefile.modpost:101: __modpost] Error 2
[  416s] make[7]: *** [/usr/src/linux-5.3.18-150300.59.90/Makefile:1684: modules] Error 2
[  416s] make[6]: *** [../../../linux-5.3.18-150300.59.90/Makefile:179: sub-make] Error 2
[  416s] make[5]: *** [/home/abuild/rpmbuild/BUILD/dpdk-stable-19.11.4/mk/rte.module.mk:51: igb_uio.ko] Error 2
[  416s] make[4]: *** [/home/abuild/rpmbuild/BUILD/dpdk-stable-19.11.4/mk/rte.subdir.mk:37: igb_uio] Error 2
[  416s] make[3]: *** [/home/abuild/rpmbuild/BUILD/dpdk-stable-19.11.4/mk/rte.subdir.mk:37: linux] Error 2
[  416s] make[2]: *** [/home/abuild/rpmbuild/BUILD/dpdk-stable-19.11.4/mk/rte.sdkbuild.mk:48: kernel] Error 2
[  416s] make[1]: *** [/home/abuild/rpmbuild/BUILD/dpdk-stable-19.11.4/mk/rte.sdkroot.mk:99: all] Error 2
[  416s] make: *** [Makefile:12: all] Error 2
[  416s] error: Bad exit status from /var/tmp/rpm-tmp.xTyYig (%build)


This is with or without the patch.
Comment 4 Petr Gajdos 2022-09-13 06:49:01 UTC
(In reply to Petr Gajdos from comment #2)
> Submitted for: 15sp4,15sp2,15sp1,15,12sp5/dpdk.
> 
> I get a build failure for 15sp3 which I do not know how to fix sofar:

[  416s] make[9]: *** No rule to make target 'vmlinux', needed by '/home/abuild/rpmbuild/BUILD/dpdk-stable-19.11.4/x86_64-native-linuxapp-gcc-default/build/kernel/linux/igb_uio/igb_uio.ko'.  Stop.

> [  416s] make[8]: ***
> [/usr/src/linux-5.3.18-150300.59.90/scripts/Makefile.modpost:101: __modpost]
> Error 2
> [  416s] make[7]: *** [/usr/src/linux-5.3.18-150300.59.90/Makefile:1684:
> modules] Error 2
> [  416s] make[6]: *** [../../../linux-5.3.18-150300.59.90/Makefile:179:
> sub-make] Error 2
> [  416s] make[5]: ***
> [/home/abuild/rpmbuild/BUILD/dpdk-stable-19.11.4/mk/rte.module.mk:51:
> igb_uio.ko] Error 2
> [  416s] make[4]: ***
> [/home/abuild/rpmbuild/BUILD/dpdk-stable-19.11.4/mk/rte.subdir.mk:37:
> igb_uio] Error 2
> [  416s] make[3]: ***
> [/home/abuild/rpmbuild/BUILD/dpdk-stable-19.11.4/mk/rte.subdir.mk:37: linux]
> Error 2
> [  416s] make[2]: ***
> [/home/abuild/rpmbuild/BUILD/dpdk-stable-19.11.4/mk/rte.sdkbuild.mk:48:
> kernel] Error 2
> [  416s] make[1]: ***
> [/home/abuild/rpmbuild/BUILD/dpdk-stable-19.11.4/mk/rte.sdkroot.mk:99: all]
> Error 2
> [  416s] make: *** [Makefile:12: all] Error 2
> [  416s] error: Bad exit status from /var/tmp/rpm-tmp.xTyYig (%build)
> 
> 
> This is with or without the patch.
Comment 5 Petr Gajdos 2022-09-13 13:17:55 UTC
(In reply to Petr Gajdos from comment #2)
> I get a build failure for 15sp3 which I do not know how to fix sofar:

see bug 1203365
Comment 6 Petr Gajdos 2022-09-15 15:28:57 UTC
Submitted also for 15sp3/dpdk.

I believe all fixed.
Comment 8 Swamp Workflow Management 2022-09-23 10:19:51 UTC
SUSE-SU-2022:3341-1: An update that fixes two vulnerabilities is now available.

Category: security (important)
Bug References: 1202903,1202956
CVE References: CVE-2022-2132,CVE-2022-28199
JIRA References: 
Sources used:
openSUSE Leap 15.4 (src):    dpdk-19.11.10-150400.4.7.1, dpdk-thunderx-19.11.10-150400.4.7.1
SUSE Linux Enterprise Module for Server Applications 15-SP4 (src):    dpdk-19.11.10-150400.4.7.1, dpdk-thunderx-19.11.10-150400.4.7.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 Swamp Workflow Management 2022-09-23 19:20:39 UTC
SUSE-SU-2022:3356-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1202903
CVE References: CVE-2022-2132
JIRA References: 
Sources used:
SUSE Linux Enterprise Server for SAP 15 (src):    dpdk-18.11.9-150000.3.32.2
SUSE Linux Enterprise Server 15-LTSS (src):    dpdk-18.11.9-150000.3.32.2, dpdk-thunderx-18.11.9-150000.3.32.2
SUSE Linux Enterprise High Performance Computing 15-LTSS (src):    dpdk-18.11.9-150000.3.32.2, dpdk-thunderx-18.11.9-150000.3.32.2
SUSE Linux Enterprise High Performance Computing 15-ESPOS (src):    dpdk-18.11.9-150000.3.32.2, dpdk-thunderx-18.11.9-150000.3.32.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 Swamp Workflow Management 2022-09-26 16:21:49 UTC
SUSE-SU-2022:3390-1: An update that fixes two vulnerabilities is now available.

Category: security (important)
Bug References: 1202903,1202956
CVE References: CVE-2022-2132,CVE-2022-28199
JIRA References: 
Sources used:
openSUSE Leap 15.3 (src):    dpdk-19.11.4-150300.16.1, dpdk-thunderx-19.11.4-150300.16.1
SUSE Linux Enterprise Module for Server Applications 15-SP3 (src):    dpdk-19.11.4-150300.16.1, dpdk-thunderx-19.11.4-150300.16.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 11 Swamp Workflow Management 2022-09-26 16:26:09 UTC
SUSE-SU-2022:3381-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1202903
CVE References: CVE-2022-2132
JIRA References: 
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    dpdk-18.11.9-3.24.1, dpdk-thunderx-18.11.9-3.24.1
SUSE Linux Enterprise Server 12-SP5 (src):    dpdk-18.11.9-3.24.1, dpdk-thunderx-18.11.9-3.24.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 Swamp Workflow Management 2022-09-27 16:26:09 UTC
SUSE-SU-2022:3430-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1202903
CVE References: CVE-2022-2132
JIRA References: 
Sources used:
openSUSE Leap 15.4 (src):    dpdk-18.11.9-150100.4.19.1
openSUSE Leap 15.3 (src):    dpdk-18.11.9-150100.4.19.1
SUSE Linux Enterprise Server for SAP 15-SP1 (src):    dpdk-18.11.9-150100.4.19.1
SUSE Linux Enterprise Server 15-SP1-LTSS (src):    dpdk-18.11.9-150100.4.19.1
SUSE Linux Enterprise Server 15-SP1-BCL (src):    dpdk-18.11.9-150100.4.19.1
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src):    dpdk-18.11.9-150100.4.19.1
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src):    dpdk-18.11.9-150100.4.19.1
SUSE Enterprise Storage 6 (src):    dpdk-18.11.9-150100.4.19.1
SUSE CaaS Platform 4.0 (src):    dpdk-18.11.9-150100.4.19.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 13 Swamp Workflow Management 2022-09-27 16:27:08 UTC
SUSE-SU-2022:3429-1: An update that fixes two vulnerabilities is now available.

Category: security (important)
Bug References: 1202903,1202956
CVE References: CVE-2022-2132,CVE-2022-28199
JIRA References: 
Sources used:
SUSE Manager Server 4.1 (src):    dpdk-19.11.4-150200.3.20.1
SUSE Manager Retail Branch Server 4.1 (src):    dpdk-19.11.4-150200.3.20.1
SUSE Manager Proxy 4.1 (src):    dpdk-19.11.4-150200.3.20.1
SUSE Linux Enterprise Server for SAP 15-SP2 (src):    dpdk-19.11.4-150200.3.20.1
SUSE Linux Enterprise Server 15-SP2-LTSS (src):    dpdk-19.11.4-150200.3.20.1, dpdk-thunderx-19.11.4-150200.3.20.1
SUSE Linux Enterprise Server 15-SP2-BCL (src):    dpdk-19.11.4-150200.3.20.1
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src):    dpdk-19.11.4-150200.3.20.1, dpdk-thunderx-19.11.4-150200.3.20.1
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src):    dpdk-19.11.4-150200.3.20.1, dpdk-thunderx-19.11.4-150200.3.20.1
SUSE Enterprise Storage 7 (src):    dpdk-19.11.4-150200.3.20.1, dpdk-thunderx-19.11.4-150200.3.20.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.