A vulnerability was fixed in DPDK. Some downstream stakeholders were warned in advance through security-prerele...@dpdk.org in order to coordinate the release of fixes and reduce the vulnerability window [0].
A malicious guest using a virtio driver can cause the vhost-user side to crash by sending a packet with a Tx checksum offload request and an invalid csum_start offset. Commits per branch:main - https://git.dpdk.org/dpdk/commit/?id=4dc4e33ffa108e945fc8a1e2bbc7819791faa61e 24.11 - https://git.dpdk.org/dpdk-stable/commit/?id=fdf13ea6fede07538fbe5e2a46fa6d4b2368fa81 23.11 - https://git.dpdk.org/dpdk-stable/commit/?id=b8e7797c11e5121d738b8c468ee08f3411474d1c 22.11 - https://git.dpdk.org/dpdk-stable/commit/?id=1570aef08bfde179449a9501bd54888a7d5f2cd6 21.11 - https://git.dpdk.org/dpdk-stable/commit/?id=e9c0ad133242c0bcb7801d2590e8bb5f7ac4ebfd
LTS Releases: 24.11 - https://fast.dpdk.org/rel/dpdk-24.11.1.tar.xz 23.11 - https://fast.dpdk.org/rel/dpdk-23.11.3.tar.xz 22.11 - https://fast.dpdk.org/rel/dpdk-22.11.7.tar.xz 21.11 - https://fast.dpdk.org/rel/dpdk-21.11.9.tar.xz CVE: CVE-2024-11614 Severity: 7.2 CVSS scores: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:F/RC:C [0]: https://mails.dpdk.org/listinfo/security-prerelease