An integer underflow in dpdk versions before 18.11.10 and before 19.11.5 in the `move_desc` function can lead to large amounts of CPU cycles being eaten up in a long running loop. An attacker could cause `move_desc` to get stuck in a 4,294,967,295-count iteration loop. Depending on how `vhost_crypto` is being used this could prevent other VMs or network tasks from being serviced by the busy DPDK lcore for an extended period.
The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.
Link | Tags |
---|---|
https://www.openwall.com/lists/oss-security/2020/09/28/3 | patch mailing list third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1879473 | third party advisory issue tracking |
https://usn.ubuntu.com/4550-1/ | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00004.html | vendor advisory mailing list third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00006.html | vendor advisory mailing list third party advisory |
http://www.openwall.com/lists/oss-security/2021/01/04/5 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2021/01/04/1 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2021/01/04/2 | third party advisory mailing list |