https://bugs.dpdk.org/show_bug.cgi?id=724

            Bug ID: 724
           Summary: Guest causes DPDK to read out of bounds
           Product: DPDK
           Version: 20.11
          Hardware: All
                OS: All
            Status: UNCONFIRMED
          Severity: normal
          Priority: Normal
         Component: vhost/virtio
          Assignee: dev@dpdk.org
          Reporter: cheng1.ji...@intel.com
  Target Milestone: ---

Report From: dsfasd daf <coolboy43...@gmail.com>
Report Date: Thu, 11 Mar 2021 10:24:24 +0000

Report:


Hi, 
I am clark, a security researcher of Tencent Blade Team. I recently discovered
several security vulnerabilities in DPDK, as follows

1. 
Code:
        examples/vhost/virtio_net.c 
                vs_enqueue_pkts()
                        desc_indexes[i] = vr->avail->ring[used_idx];
                        ...
                        uint16_t desc_idx = desc_indexes[i];
                        err = enqueue_pkt(dev, vr, pkts[i], desc_idx);

                enqueue_pkt(struct vhost_dev *dev, struct rte_vhost_vring *vr,
struct rte_mbuf *m, uint16_t desc_idx) {
                        ...
                        desc = &vr->desc[desc_idx];
                }
description:
        desc_indexes[i] = vr->avail->ring[used_idx] Its value can be fully
controlled by the guest, which will cause out-of-bounds writing in the
enqueue_pkt function
harm:
        Guest causes DPDK to write out of bounds
patch suggestions:
        vs_enqueue_pkts() {
                ...
        +       if (vr->avail->ring[used_idx] >= vr->size)
        +               return 0;
                desc_indexes[i] = vr->avail->ring[used_idx];
                ...
        }

2. 
Code:
        examples/vhost/virtio_net.c 
                vs_dequeue_pkts()
                        desc_indexes[i] = vr->avail->ring[avail_idx];
                        dequeue_pkt(dev, vr, pkts[i], desc_indexes[i],
mbuf_pool);
                dequeue_pkt(struct vhost_dev *dev, struct rte_vhost_vring *vr,
struct rte_mbuf *m, uint16_t desc_idx, struct rte_mempool *mbuf_pool) {
                        desc = &vr->desc[desc_idx];
                }
description:
        desc_indexes[i] = vr->avail->ring[avail_idx]; Its value can be fully
controlled by the guest, which will cause out-of-bounds reading in the
dequeue_pkt function.
harm:
        Guest causes DPDK to read out of bounds
patch suggestions:
        vs_dequeue_pkts() {
                ...
        +       if (vr->avail->ring[used_idx] >= vr->size)
        +               return 0;
                desc_indexes[i] = vr->avail->ring[avail_idx];
                ...
        }

3. 
Code:
        examples/vhost_blk/vhost_blk.c
                vq_get_desc_idx()
                        desc_idx = vq->vring.avail->ring[last_avail_idx];
                process_vq()
                        desc_idx = vq_get_desc_idx(vq);
                        task = &vq->tasks[desc_idx];
                        ...
                        process_blk_task(task);
description:
        desc_idx = vq->vring.avail->ring[last_avail_idx]; Its value can be
fully controlled by the guest, process_blk_task(task); will further cause
out-of-bounds read and write.
harm:
        Guest causes DPDK to read and write out of bounds
patch suggestions:
        process_vq() {
                desc_idx = vq_get_desc_idx(vq);
        +       if (desc_idx >= vq->vring.size)
                        return;
                task = &vq->tasks[desc_idx];


4. 
Code:
        lib/librte_vhost/vhost_user.c  
                vhost_user_postcopy_register() 
                        if (read_vhost_message(main_fd, &ack_msg) <= 0) {}
description:
        vhost_user_postcopy_register is called in the vhost_user_set_mem_table
function, When dev->postcopy_listening was set to 1,
vhost_user_postcopy_register will call read_vhost_message 
and wait for qemu to respond to this message. If there is a Malicious qemu
process does not reply to this message, DPDK will wait for the response
indefinitely, and other legitimate qemu processes 
will not be able to communicate with DPDK normally. This will result in A DoS
attack.
harm:
        qemu causes DPDK denial of service
patch suggestions:
        Add a timeout mechanism

5. 
Code:
        lib/librte_vhost/vhost_crypto.c
                rte_vhost_crypto_fetch_requests()
                        uint16_t desc_idx = vq->avail->ring[used_idx];
                        struct vring_desc *head = &vq->desc[desc_idx];
                        if (unlikely(vhost_crypto_process_one_req(vcrypto, vq,
                                        op, head, descs, used_idx) < 0))
description:
        uint16_t desc_idx = vq->avail->ring[used_idx]; Its value can be fully
controlled by the guest, vhost_crypto_process_one_req(task); will further cause
out-of-bounds reading.
harm:
        Guest causes DPDK to read out of bounds
patch suggestions:
        rte_vhost_crypto_fetch_requests()
                uint16_t desc_idx = vq->avail->ring[used_idx];
        +       if (desc_idx >= vq->size)
        +               return0;
                struct vring_desc *head = &vq->desc[desc_idx];

summary:
Vulnerability 1: The guest causes DPDK to write out of bounds, or it can cause
the virtual machine to escape
Vulnerability 2: Guest causes DPDK to read out of bounds, or causes DPDK DoS
Vulnerability 3: The guest causes DPDK to read and write out of bounds, or it
can cause the virtual machine to escape
Vulnerability 4: qemu causes DPDK denial of service
Vulnerability 5: guest causes DPDK to read out of bounds, or causes DPDK DoS
The above vulnerabilities 1, 2, and 3 are in the exampleCode, but I think it is
still a serious threat, because these example codes may be used in formal
occasions.

-- 
You are receiving this mail because:
You are the assignee for the bug.

Reply via email to