> -----Original Message-----
> From: Maxime Coquelin [mailto:maxime.coque...@redhat.com]
> Sent: Tuesday, December 17, 2024 11:33 PM
> To: dev@dpdk.org
> Cc: Olivier Matz <olivier.m...@6wind.com>; Maxime Gouin
> <maxime.go...@6wind.com>; Maxime Coquelin
> <maxime.coque...@redhat.com>
> Subject: [PATCH] net/virtio: fix Rx checksum calculation
> 
> From: Olivier Matz <olivier.m...@6wind.com>
> 
> If hdr->csum_start is larger than packet length, the len argument passed
> to rte_raw_cksum_mbuf() overflows and causes a segmentation fault.
> 
> Ignore checksum computation in this case.
> 
> CVE-2024-11614
> 
> Fixes: ca7036b4af3a ("vhost: fix offload flags in Rx path")
> 
> Signed-off-by: Maxime Gouin <maxime.go...@6wind.com>
> Signed-off-by: Olivier Matz <olivier.m...@6wind.com>
> Reviewed-by: Maxime Coquelin <maxime.coque...@redhat.com>
> ---
>  lib/vhost/virtio_net.c | 3 +++
>  1 file changed, 3 insertions(+)
> 
> diff --git a/lib/vhost/virtio_net.c b/lib/vhost/virtio_net.c
> index d764d4bc6a..69901ab3b5 100644
> --- a/lib/vhost/virtio_net.c
> +++ b/lib/vhost/virtio_net.c
> @@ -2823,6 +2823,9 @@ vhost_dequeue_offload(struct virtio_net *dev,
> struct virtio_net_hdr *hdr,
>                        */
>                       uint16_t csum = 0, off;
> 
> +                     if (hdr->csum_start >= rte_pktmbuf_pkt_len(m))
> +                             return;
> +

The hdr->csum_start does two successive reads from user space to read
a variable length data structure. The result overflow if the data structure
changes between the two reads.

We can prevent double fetch issue by using the temporary variable csum_start.

Thanks,
Yunjian

>                       if (rte_raw_cksum_mbuf(m, hdr->csum_start,
>                                       rte_pktmbuf_pkt_len(m) - 
> hdr->csum_start, &csum) <
> 0)
>                               return;
> --
> 2.47.0

Reply via email to