Vulnerabilities > CVE-2019-14818 - Memory Leak vulnerability in multiple products

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
HIGH
network
low complexity
dpdk
redhat
fedoraproject
CWE-401
nessus

Summary

A flaw was found in all dpdk version 17.x.x before 17.11.8, 16.x.x before 16.11.10, 18.x.x before 18.11.4 and 19.x.x before 19.08.1 where a malicious master, or a container with access to vhost_user socket, can send specially crafted VRING_SET_NUM messages, resulting in a memory leak including file descriptors. This flaw could lead to a denial of service condition.

Vulnerable Configurations

Part Description Count
Application
Dpdk
43
Application
Redhat
4
OS
Fedoraproject
1

Nessus

  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-4567.NASL
    descriptionIt was discovered that the vhost PMD in DPDK, a set of libraries for fast packet processing, was affected by memory and file descriptor leaks which could result in denial of service.
    last seen2020-06-01
    modified2020-06-02
    plugin id130985
    published2019-11-14
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/130985
    titleDebian DSA-4567-1 : dpdk - security update
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Debian Security Advisory DSA-4567. The text 
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(130985);
      script_version("1.3");
      script_cvs_date("Date: 2019/12/12");
    
      script_cve_id("CVE-2019-14818");
      script_xref(name:"DSA", value:"4567");
    
      script_name(english:"Debian DSA-4567-1 : dpdk - security update");
      script_summary(english:"Checks dpkg output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "It was discovered that the vhost PMD in DPDK, a set of libraries for
    fast packet processing, was affected by memory and file descriptor
    leaks which could result in denial of service."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/source-package/dpdk"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://packages.debian.org/source/stretch/dpdk"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://packages.debian.org/source/buster/dpdk"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.debian.org/security/2019/dsa-4567"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Upgrade the dpdk packages.
    
    For the oldstable distribution (stretch), this problem has been fixed
    in version 16.11.9-1+deb9u2.
    
    For the stable distribution (buster), this problem has been fixed in
    version 18.11.2-2+deb10u2."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:dpdk");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:10.0");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:9.0");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/11/14");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/11/12");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/11/14");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"10.0", prefix:"dpdk", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"dpdk-dev", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"dpdk-doc", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"dpdk-igb-uio-dkms", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"dpdk-rte-kni-dkms", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"libdpdk-dev", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-acl18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-bbdev18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-bitratestats18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-bpf18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-bus-dpaa18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-bus-fslmc18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-bus-ifpga18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-bus-pci18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-bus-vdev18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-bus-vmbus18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-cfgfile18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-cmdline18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-common-cpt18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-common-dpaax18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-common-octeontx18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-compressdev18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-cryptodev18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-distributor18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-eal18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-efd18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-ethdev18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-eventdev18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-flow-classify18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-gro18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-gso18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-hash18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-ip-frag18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-jobstats18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-kni18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-kvargs18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-latencystats18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-lpm18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-mbuf18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-member18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-mempool-bucket18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-mempool-dpaa18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-mempool-dpaa2-18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-mempool-octeontx18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-mempool-ring18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-mempool-stack18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-mempool18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-meter18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-metrics18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-net18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pci18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pdump18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pipeline18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-aesni-gcm18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-aesni-mb18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-af-packet18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-ark18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-atlantic18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-avf18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-avp18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-axgbe18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-bbdev-null18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-bnx2x18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-bnxt18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-bond18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-caam-jr18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-ccp18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-crypto-scheduler18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-cxgbe18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-dpaa-event18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-dpaa-sec18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-dpaa18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-dpaa2-18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-dpaa2-cmdif18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-dpaa2-event18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-dpaa2-qdma18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-dpaa2-sec18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-dsw-event18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-e1000-18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-ena18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-enetc18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-enic18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-failsafe18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-fm10k18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-i40e18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-ifc18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-ifpga-rawdev18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-ixgbe18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-kni18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-liquidio18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-mlx4-18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-mlx5-18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-netvsc18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-nfp18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-null-crypto18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-null18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-octeontx-compress18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-octeontx-crypto18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-octeontx-event18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-octeontx18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-opdl-event18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-openssl18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-pcap18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-qat18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-qede18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-ring18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-sfc18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-skeleton-event18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-skeleton-rawdev18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-softnic18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-sw-event18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-tap18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-thunderx18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-vdev-netvsc18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-vhost18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-virtio-crypto18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-virtio18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-vmxnet3-18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-pmd-zlib18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-port18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-power18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-rawdev18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-reorder18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-ring18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-sched18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-security18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-table18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-telemetry18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-timer18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"10.0", prefix:"librte-vhost18.11", reference:"18.11.2-2+deb10u2")) flag++;
    if (deb_check(release:"9.0", prefix:"dpdk", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"dpdk-dev", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"dpdk-doc", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"dpdk-igb-uio-dkms", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"dpdk-rte-kni-dkms", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"libdpdk-dev", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"libethdev4", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-acl2", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-cfgfile2", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-cmdline2", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-cryptodev1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-cryptodev2", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-distributor1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-eal2", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-eal3", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-ethdev5", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-hash2", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-ip-frag1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-jobstats1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-kni2", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-kvargs1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-lpm2", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-mbuf2", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-mempool2", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-meter1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-net1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-pdump1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-pipeline3", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-pmd-af-packet1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-pmd-bnxt1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-pmd-bond1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-pmd-cxgbe1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-pmd-e1000-1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-pmd-ena1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-pmd-enic1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-pmd-fm10k1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-pmd-i40e1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-pmd-ixgbe1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-pmd-null-crypto1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-pmd-null1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-pmd-pcap1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-pmd-qede1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-pmd-ring2", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-pmd-vhost1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-pmd-virtio1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-pmd-vmxnet3-uio1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-pmd-xenvirt1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-port3", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-power1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-reorder1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-ring1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-sched1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-table2", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-timer1", reference:"16.11.9-1+deb9u2")) flag++;
    if (deb_check(release:"9.0", prefix:"librte-vhost3", reference:"16.11.9-1+deb9u2")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2020-0172.NASL
    descriptionAn update for openvswitch2.12 is now available for Fast Datapath for RHEL 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Security Fix(es) : * dpdk: possible memory leak leads to denial of service (CVE-2019-14818) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es) : * ovs-tcpundump doesn
    last seen2020-06-01
    modified2020-06-02
    plugin id133161
    published2020-01-22
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/133161
    titleRHEL 8 : openvswitch2.12 (RHSA-2020:0172)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2020:0172. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(133161);
      script_version("1.2");
      script_cvs_date("Date: 2020/01/24");
    
      script_cve_id("CVE-2019-14818");
      script_xref(name:"RHSA", value:"2020:0172");
    
      script_name(english:"RHEL 8 : openvswitch2.12 (RHSA-2020:0172)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An update for openvswitch2.12 is now available for Fast Datapath for
    RHEL 8.
    
    Red Hat Product Security has rated this update as having a security
    impact of Moderate. A Common Vulnerability Scoring System (CVSS) base
    score, which gives a detailed severity rating, is available for each
    vulnerability from the CVE link(s) in the References section.
    
    Open vSwitch provides standard network bridging functions and support
    for the OpenFlow protocol for remote per-flow control of traffic.
    
    Security Fix(es) :
    
    * dpdk: possible memory leak leads to denial of service
    (CVE-2019-14818)
    
    For more details about the security issue(s), including the impact, a
    CVSS score, acknowledgments, and other related information, refer to
    the CVE page(s) listed in the References section.
    
    Bug Fix(es) :
    
    * ovs-tcpundump doesn't work well on special packet (BZ#1780553)
    
    * ovs-tcpundump -V won't exit (BZ#1780555)
    
    * SyntaxError: Missing parentheses in call to 'print' (BZ#1780563)
    
    * measure the time needed by ovn-controller to resync to a new SB db
    (BZ# 1780719)"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2020:0172"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2019-14818"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:network-scripts-openvswitch2.12");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:openvswitch2.12");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:openvswitch2.12-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:openvswitch2.12-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:openvswitch2.12-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:openvswitch2.12-test");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:python3-openvswitch2.12");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:python3-openvswitch2.12-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:8");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/11/14");
      script_set_attribute(attribute:"patch_publication_date", value:"2020/01/22");
      script_set_attribute(attribute:"plugin_publication_date", value:"2020/01/22");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^8([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 8.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2020:0172";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
      if (rpm_check(release:"RHEL8", cpu:"s390x", reference:"network-scripts-openvswitch2.12-2.12.0-12.el8fdp")) flag++;
      if (rpm_check(release:"RHEL8", cpu:"x86_64", reference:"network-scripts-openvswitch2.12-2.12.0-12.el8fdp")) flag++;
      if (rpm_check(release:"RHEL8", cpu:"s390x", reference:"openvswitch2.12-2.12.0-12.el8fdp")) flag++;
      if (rpm_check(release:"RHEL8", cpu:"x86_64", reference:"openvswitch2.12-2.12.0-12.el8fdp")) flag++;
      if (rpm_check(release:"RHEL8", cpu:"s390x", reference:"openvswitch2.12-debuginfo-2.12.0-12.el8fdp")) flag++;
      if (rpm_check(release:"RHEL8", cpu:"x86_64", reference:"openvswitch2.12-debuginfo-2.12.0-12.el8fdp")) flag++;
      if (rpm_check(release:"RHEL8", cpu:"s390x", reference:"openvswitch2.12-debugsource-2.12.0-12.el8fdp")) flag++;
      if (rpm_check(release:"RHEL8", cpu:"x86_64", reference:"openvswitch2.12-debugsource-2.12.0-12.el8fdp")) flag++;
      if (rpm_check(release:"RHEL8", cpu:"s390x", reference:"openvswitch2.12-devel-2.12.0-12.el8fdp")) flag++;
      if (rpm_check(release:"RHEL8", cpu:"x86_64", reference:"openvswitch2.12-devel-2.12.0-12.el8fdp")) flag++;
      if (rpm_check(release:"RHEL8", reference:"openvswitch2.12-test-2.12.0-12.el8fdp")) flag++;
      if (rpm_check(release:"RHEL8", cpu:"s390x", reference:"python3-openvswitch2.12-2.12.0-12.el8fdp")) flag++;
      if (rpm_check(release:"RHEL8", cpu:"x86_64", reference:"python3-openvswitch2.12-2.12.0-12.el8fdp")) flag++;
      if (rpm_check(release:"RHEL8", cpu:"s390x", reference:"python3-openvswitch2.12-debuginfo-2.12.0-12.el8fdp")) flag++;
      if (rpm_check(release:"RHEL8", cpu:"x86_64", reference:"python3-openvswitch2.12-debuginfo-2.12.0-12.el8fdp")) flag++;
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "network-scripts-openvswitch2.12 / openvswitch2.12 / etc");
      }
    }
    
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2020-0412-1.NASL
    descriptionThis update for dpdk to version 18.11.3 fixes the following issues : dpdk was updated to 18.11.3 Security issue fixed : CVE-2019-14818: Fixed a memory leak vulnerability caused by a malicious container may lead to to denial of service (bsc#1156146). Other issues addressed: Changed to multibuild (bsc#1151455). Fixed a regression caused by loading old version drivers (bsc#1157179). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-18
    modified2020-02-20
    plugin id133836
    published2020-02-20
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/133836
    titleSUSE SLES12 Security Update : dpdk (SUSE-SU-2020:0412-1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from SUSE update advisory SUSE-SU-2020:0412-1.
    # The text itself is copyright (C) SUSE.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(133836);
      script_version("1.2");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/02/24");
    
      script_cve_id("CVE-2019-14818");
    
      script_name(english:"SUSE SLES12 Security Update : dpdk (SUSE-SU-2020:0412-1)");
      script_summary(english:"Checks rpm output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote SUSE host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update for dpdk to version 18.11.3 fixes the following issues :
    
    dpdk was updated to 18.11.3
    
    Security issue fixed :
    
    CVE-2019-14818: Fixed a memory leak vulnerability caused by a
    malicious container may lead to to denial of service (bsc#1156146).
    
    Other issues addressed: Changed to multibuild (bsc#1151455).
    
    Fixed a regression caused by loading old version drivers
    (bsc#1157179).
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the SUSE security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1151455"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1156146"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1157179"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2019-14818/"
      );
      # https://www.suse.com/support/update/announcement/2020/suse-su-20200412-1/
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?923ece8f"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "To install this SUSE Security Update use the SUSE recommended
    installation methods like YaST online_update or 'zypper patch'.
    
    Alternatively you can run the command listed for your product :
    
    SUSE Linux Enterprise Software Development Kit 12-SP5:zypper in -t
    patch SUSE-SLE-SDK-12-SP5-2020-412=1
    
    SUSE Linux Enterprise Server 12-SP5:zypper in -t patch
    SUSE-SLE-SERVER-12-SP5-2020-412=1"
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:dpdk");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:dpdk-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:dpdk-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:dpdk-kmp-default");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:dpdk-kmp-default-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:dpdk-tools");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:dpdk-tools-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libdpdk");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libdpdk-18_11-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:12");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/11/14");
      script_set_attribute(attribute:"patch_publication_date", value:"2020/02/19");
      script_set_attribute(attribute:"plugin_publication_date", value:"2020/02/20");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
    os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE");
    os_ver = os_ver[1];
    if (! preg(pattern:"^(SLES12)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLES12", "SUSE " + os_ver);
    
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu);
    if (cpu >!< "x86_64") audit(AUDIT_ARCH_NOT, "x86_64", cpu);
    
    
    sp = get_kb_item("Host/SuSE/patchlevel");
    if (isnull(sp)) sp = "0";
    if (os_ver == "SLES12" && (! preg(pattern:"^(5)$", string:sp))) audit(AUDIT_OS_NOT, "SLES12 SP5", os_ver + " SP" + sp);
    
    
    flag = 0;
    if (rpm_check(release:"SLES12", sp:"5", cpu:"x86_64", reference:"dpdk-18.11.3-3.6.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"5", cpu:"x86_64", reference:"dpdk-debuginfo-18.11.3-3.6.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"5", cpu:"x86_64", reference:"dpdk-debugsource-18.11.3-3.6.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"5", cpu:"x86_64", reference:"dpdk-tools-18.11.3-3.6.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"5", cpu:"x86_64", reference:"dpdk-tools-debuginfo-18.11.3-3.6.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"5", cpu:"x86_64", reference:"libdpdk-18_11-18.11.3-3.6.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"5", cpu:"x86_64", reference:"libdpdk-18_11-debuginfo-18.11.3-3.6.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"5", cpu:"x86_64", reference:"dpdk-kmp-default-18.11.3_k4.12.14_122.12-3.6.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"5", cpu:"x86_64", reference:"dpdk-kmp-default-debuginfo-18.11.3_k4.12.14_122.12-3.6.1")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "dpdk");
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2020-0168.NASL
    descriptionAn update for openvswitch2.12 is now available for Fast Datapath for RHEL 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Security Fix(es) : * dpdk: possible memory leak leads to denial of service (CVE-2019-14818) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es) : * measure the time needed by ovn-controller to resync to a new SB db (BZ# 1720653)
    last seen2020-06-01
    modified2020-06-02
    plugin id133159
    published2020-01-22
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/133159
    titleRHEL 7 : openvswitch2.12 (RHSA-2020:0168)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2020:0168. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(133159);
      script_version("1.2");
      script_cvs_date("Date: 2020/01/24");
    
      script_cve_id("CVE-2019-14818");
      script_xref(name:"RHSA", value:"2020:0168");
    
      script_name(english:"RHEL 7 : openvswitch2.12 (RHSA-2020:0168)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An update for openvswitch2.12 is now available for Fast Datapath for
    RHEL 7.
    
    Red Hat Product Security has rated this update as having a security
    impact of Moderate. A Common Vulnerability Scoring System (CVSS) base
    score, which gives a detailed severity rating, is available for each
    vulnerability from the CVE link(s) in the References section.
    
    Open vSwitch provides standard network bridging functions and support
    for the OpenFlow protocol for remote per-flow control of traffic.
    
    Security Fix(es) :
    
    * dpdk: possible memory leak leads to denial of service
    (CVE-2019-14818)
    
    For more details about the security issue(s), including the impact, a
    CVSS score, acknowledgments, and other related information, refer to
    the CVE page(s) listed in the References section.
    
    Bug Fix(es) :
    
    * measure the time needed by ovn-controller to resync to a new SB db
    (BZ# 1720653)"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2020:0168"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2019-14818"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:openvswitch2.12");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:openvswitch2.12-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:openvswitch2.12-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:openvswitch2.12-test");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:python-openvswitch2.12");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/11/14");
      script_set_attribute(attribute:"patch_publication_date", value:"2020/01/21");
      script_set_attribute(attribute:"plugin_publication_date", value:"2020/01/22");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 7.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2020:0168";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"openvswitch2.12-2.12.0-12.el7fdp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"openvswitch2.12-2.12.0-12.el7fdp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"openvswitch2.12-debuginfo-2.12.0-12.el7fdp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"openvswitch2.12-debuginfo-2.12.0-12.el7fdp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"openvswitch2.12-devel-2.12.0-12.el7fdp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"openvswitch2.12-devel-2.12.0-12.el7fdp")) flag++;
      if (rpm_check(release:"RHEL7", reference:"openvswitch2.12-test-2.12.0-12.el7fdp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"python-openvswitch2.12-2.12.0-12.el7fdp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"python-openvswitch2.12-2.12.0-12.el7fdp")) flag++;
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "openvswitch2.12 / openvswitch2.12-debuginfo / openvswitch2.12-devel / etc");
      }
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2020-0166.NASL
    descriptionAn update for openvswitch2.11 is now available for Fast Datapath for RHEL 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Security Fix(es) : * dpdk: possible memory leak leads to denial of service (CVE-2019-14818) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es) : * [openvswitch] No traffic over GRE IPv6 tunnel - OVS issue (userspace) (BZ# 1725623) * [RHEL 7] [ovsdb-server] Allow replicating from older schema servers (BZ# 1766586) * measure the time needed by ovn-controller to resync to a new SB db (BZ# 1776883) * [ovs2.11] SSL connections drops are constantly logged in ovsdb-server-nb.log (BZ#1780745)
    last seen2020-06-01
    modified2020-06-02
    plugin id133127
    published2020-01-21
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/133127
    titleRHEL 7 : openvswitch2.11 (RHSA-2020:0166)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2020:0166. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(133127);
      script_version("1.2");
      script_cvs_date("Date: 2020/01/23");
    
      script_cve_id("CVE-2019-14818");
      script_xref(name:"RHSA", value:"2020:0166");
    
      script_name(english:"RHEL 7 : openvswitch2.11 (RHSA-2020:0166)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An update for openvswitch2.11 is now available for Fast Datapath for
    RHEL 7.
    
    Red Hat Product Security has rated this update as having a security
    impact of Moderate. A Common Vulnerability Scoring System (CVSS) base
    score, which gives a detailed severity rating, is available for each
    vulnerability from the CVE link(s) in the References section.
    
    Open vSwitch provides standard network bridging functions and support
    for the OpenFlow protocol for remote per-flow control of traffic.
    
    Security Fix(es) :
    
    * dpdk: possible memory leak leads to denial of service
    (CVE-2019-14818)
    
    For more details about the security issue(s), including the impact, a
    CVSS score, acknowledgments, and other related information, refer to
    the CVE page(s) listed in the References section.
    
    Bug Fix(es) :
    
    * [openvswitch] No traffic over GRE IPv6 tunnel - OVS issue
    (userspace) (BZ# 1725623)
    
    * [RHEL 7] [ovsdb-server] Allow replicating from older schema servers
    (BZ# 1766586)
    
    * measure the time needed by ovn-controller to resync to a new SB db
    (BZ# 1776883)
    
    * [ovs2.11] SSL connections drops are constantly logged in
    ovsdb-server-nb.log (BZ#1780745)"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2020:0166"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2019-14818"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:openvswitch2.11");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:openvswitch2.11-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:openvswitch2.11-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:openvswitch2.11-test");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:python-openvswitch2.11");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/11/14");
      script_set_attribute(attribute:"patch_publication_date", value:"2020/01/21");
      script_set_attribute(attribute:"plugin_publication_date", value:"2020/01/21");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 7.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2020:0166";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"openvswitch2.11-2.11.0-35.el7fdp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"openvswitch2.11-2.11.0-35.el7fdp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"openvswitch2.11-debuginfo-2.11.0-35.el7fdp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"openvswitch2.11-debuginfo-2.11.0-35.el7fdp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"openvswitch2.11-devel-2.11.0-35.el7fdp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"openvswitch2.11-devel-2.11.0-35.el7fdp")) flag++;
      if (rpm_check(release:"RHEL7", reference:"openvswitch2.11-test-2.11.0-35.el7fdp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"python-openvswitch2.11-2.11.0-35.el7fdp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"python-openvswitch2.11-2.11.0-35.el7fdp")) flag++;
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "openvswitch2.11 / openvswitch2.11-debuginfo / openvswitch2.11-devel / etc");
      }
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2019-019DF9A459.NASL
    descriptionSecurity fix for [PUT CVEs HERE] Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id131195
    published2019-11-22
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/131195
    titleFedora 31 : 2:dpdk (2019-019df9a459)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2020-0165.NASL
    descriptionAn update for openvswitch is now available for Fast Datapath for RHEL 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Security Fix(es) : * dpdk: possible memory leak leads to denial of service (CVE-2019-14818) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es) : * Fast datapath guaranteed bandwidth for SR-IOV, OVS and OVS-DPDK (Test-only) (BZ#1546429) * [ovs2.9] SSL connections drops are constantly logged in ovsdb-server-nb.log (BZ#1563574) * [FD-7 hotfix] Connectivity issue across VXLAN tunnels in OVS-DPDK after reboot of hypervisor - problem clears up after restarting openvswitch (BZ# 1758824)
    last seen2020-06-01
    modified2020-06-02
    plugin id133126
    published2020-01-21
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/133126
    titleRHEL 7 : openvswitch (RHSA-2020:0165)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-3179-1.NASL
    descriptionThis update of dpdk to version 18.11.3 provides the following fixes : dpdk was updated to 18.11.3 (fate#327817, bsc#1145713, jsc#ECO-274, fate#325916, fate#325951 fate#326025, fate#326992, bsc#1134968, jsc#SLE-4715) Security issue fixed : CVE-2019-14818: Fixed a memory leak vulnerability caused by a malicius container may lead to to denial of service (bsc#1156146). Other issues addressed: Fixed a regression by inserting version numbers to the drivers (bsc#1157179). Changed to multibuild (bsc#1151455). Added support for using externally allocated memory in DPDK. Added check for ensuring allocated memory is addressable by devices. Updated the C11 memory model version of the ring library. Added NXP CAAM JR PMD. Added support for GEN3 devices to Intel QAT driver. Added Distributed Software Eventdev PMD. Updated KNI kernel module, rte_kni library, and KNI sample application. Add a new sample application for vDPA. Updated mlx5 driver. - Improved security of PMD to prevent the NIC from getting stuck when the application misbehaves. - Reworked flow engine to supported e-switch flow rules (transfer attribute). - Added support for header re-write(L2-L4), VXLAN encap/decap, count, match on TCP flags and multiple flow groups with e-switch flow rules. - Added support for match on metadata, VXLAN and MPLS encap/decap with flow rules. - Added support for RTE_ETH_DEV_CLOSE_REMOVE flag to provide better support for representors. - Added support for meson build. - Fixed build issue with PPC. - Added support for BlueField VF. - Added support for externally allocated static memory for DMA. Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id131752
    published2019-12-06
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/131752
    titleSUSE SLES15 Security Update : dpdk (SUSE-SU-2019:3179-1)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2020-0171.NASL
    descriptionAn update for openvswitch2.11 is now available for Fast Datapath for RHEL 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Security Fix(es) : * dpdk: possible memory leak leads to denial of service (CVE-2019-14818) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es) : * SyntaxError: Missing parentheses in call to
    last seen2020-06-01
    modified2020-06-02
    plugin id133160
    published2020-01-22
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/133160
    titleRHEL 8 : openvswitch2.11 (RHSA-2020:0171)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2020-1226.NASL
    descriptionThe remote Redhat Enterprise Linux 7 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:1226 advisory. - dpdk: possible memory leak leads to denial of service (CVE-2019-14818) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-04-23
    modified2020-04-01
    plugin id135083
    published2020-04-01
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/135083
    titleRHEL 7 : dpdk (RHSA-2020:1226)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2020-1575.NASL
    descriptionAccording to the version of the spdk package installed, the EulerOS Virtualization for ARM 64 installation on the remote host is affected by the following vulnerability : - A flaw was found in all dpdk version 17.x.x before 17.11.8, 16.x.x before 16.11.10, 18.x.x before 18.11.4 and 19.x.x before 19.08.1 where a malicious master, or a container with access to vhost_user socket, can send specially crafted VRING_SET_NUM messages, resulting in a memory leak including file descriptors. This flaw could lead to a denial of service condition.(CVE-2019-14818) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-08
    modified2020-05-01
    plugin id136278
    published2020-05-01
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136278
    titleEulerOS Virtualization for ARM 64 3.0.2.0 : spdk (EulerOS-SA-2020-1575)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-2688.NASL
    descriptionAccording to the version of the dpdk packages installed, the EulerOS installation on the remote host is affected by the following vulnerability : - A flaw was found in all dpdk version 17.x.x before 17.11.8, 16.x.x before 16.11.10, 18.x.x before 18.11.4 and 19.x.x before 19.08.1 where a malicious master, or a container with access to vhost_user socket, can send specially crafted VRING_SET_NUM messages, resulting in a memory leak including file descriptors. This flaw could lead to a denial of service condition.(CVE-2019-14818) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-08
    modified2019-12-23
    plugin id132355
    published2019-12-23
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/132355
    titleEulerOS 2.0 SP5 : dpdk (EulerOS-SA-2019-2688)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2020-1039.NASL
    descriptionAccording to the version of the dpdk packages installed, the EulerOS installation on the remote host is affected by the following vulnerability : - A flaw was found in all dpdk version 17.x.x before 17.11.8, 16.x.x before 16.11.10, 18.x.x before 18.11.4 and 19.x.x before 19.08.1 where a malicious master, or a container with access to vhost_user socket, can send specially crafted VRING_SET_NUM messages, resulting in a memory leak including file descriptors. This flaw could lead to a denial of service condition.(CVE-2019-14818) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-03
    modified2020-01-02
    plugin id132632
    published2020-01-02
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/132632
    titleEulerOS 2.0 SP8 : dpdk (EulerOS-SA-2020-1039)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2020-0439-1.NASL
    descriptionThis update for dpdk to version 18.11.3 fixes the following issues : Security issue fixed : CVE-2019-14818: Fixed a denial of service by a malicious container via the vhost-user socket (bsc#1156146). Non-security issue fixed: Added current version to the PMD driver directory to avoid loading previous version drivers (bsc#1157179). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-18
    modified2020-02-25
    plugin id134035
    published2020-02-25
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/134035
    titleSUSE SLED15 / SLES15 Security Update : dpdk (SUSE-SU-2020:0439-1)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-3032-1.NASL
    descriptionThis update for dpdk to version 17.11.7 fixes the following issues : CVE-2019-14818: Fixed a memory leak vulnerability caused by a malicious container may lead to to denial of service (bsc#1156146). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id131222
    published2019-11-22
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/131222
    titleSUSE SLES12 Security Update : dpdk (SUSE-SU-2019:3032-1)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2020-1092.NASL
    descriptionAccording to the version of the spdk package installed, the EulerOS Virtualization for ARM 64 installation on the remote host is affected by the following vulnerability : - A flaw was found in all dpdk version 17.x.x before 17.11.8, 16.x.x before 16.11.10, 18.x.x before 18.11.4 and 19.x.x before 19.08.1 where a malicious master, or a container with access to vhost_user socket, can send specially crafted VRING_SET_NUM messages, resulting in a memory leak including file descriptors. This flaw could lead to a denial of service condition.(CVE-2019-14818) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id132846
    published2020-01-13
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/132846
    titleEulerOS Virtualization for ARM 64 3.0.5.0 : spdk (EulerOS-SA-2020-1092)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-4189-1.NASL
    descriptionJason Wang discovered that DPDK incorrectly handled certain messages. An attacker in a malicious container could possibly use this issue to cause DPDK to leak resources, resulting in a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id131015
    published2019-11-14
    reporterUbuntu Security Notice (C) 2019 Canonical, Inc. / NASL script (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/131015
    titleUbuntu 18.04 LTS / 19.04 / 19.10 : dpdk vulnerability (USN-4189-1)

Redhat

advisories
  • bugzilla
    id1805140
    titleRemove mlx{4,5} glue library
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 8 is installed
        ovaloval:com.redhat.rhba:tst:20193384074
      • OR
        • AND
          • commentdpdk-doc is earlier than 0:19.11-4.el8
            ovaloval:com.redhat.rhsa:tst:20201735001
          • commentdpdk-doc is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20201735002
        • AND
          • commentdpdk-debugsource is earlier than 0:19.11-4.el8
            ovaloval:com.redhat.rhsa:tst:20201735003
          • commentdpdk-debugsource is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20201735004
        • AND
          • commentdpdk-tools is earlier than 0:19.11-4.el8
            ovaloval:com.redhat.rhsa:tst:20201735005
          • commentdpdk-tools is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20201735006
        • AND
          • commentdpdk-devel is earlier than 0:19.11-4.el8
            ovaloval:com.redhat.rhsa:tst:20201735007
          • commentdpdk-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20201735008
        • AND
          • commentdpdk is earlier than 0:19.11-4.el8
            ovaloval:com.redhat.rhsa:tst:20201735009
          • commentdpdk is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20201735010
    rhsa
    idRHSA-2020:1735
    released2020-04-28
    severityModerate
    titleRHSA-2020:1735: dpdk security, bug fix, and enhancement update (Moderate)
  • rhsa
    idRHSA-2020:0165
  • rhsa
    idRHSA-2020:0166
  • rhsa
    idRHSA-2020:0168
  • rhsa
    idRHSA-2020:0171
  • rhsa
    idRHSA-2020:0172
rpms
  • openvswitch-0:2.9.0-124.el7fdp
  • openvswitch-debuginfo-0:2.9.0-124.el7fdp
  • openvswitch-devel-0:2.9.0-124.el7fdp
  • openvswitch-ovn-central-0:2.9.0-124.el7fdp
  • openvswitch-ovn-common-0:2.9.0-124.el7fdp
  • openvswitch-ovn-host-0:2.9.0-124.el7fdp
  • openvswitch-ovn-vtep-0:2.9.0-124.el7fdp
  • openvswitch-test-0:2.9.0-124.el7fdp
  • python-openvswitch-0:2.9.0-124.el7fdp
  • openvswitch2.11-0:2.11.0-35.el7fdp
  • openvswitch2.11-debuginfo-0:2.11.0-35.el7fdp
  • openvswitch2.11-devel-0:2.11.0-35.el7fdp
  • openvswitch2.11-test-0:2.11.0-35.el7fdp
  • python-openvswitch2.11-0:2.11.0-35.el7fdp
  • openvswitch2.12-0:2.12.0-12.el7fdp
  • openvswitch2.12-debuginfo-0:2.12.0-12.el7fdp
  • openvswitch2.12-devel-0:2.12.0-12.el7fdp
  • openvswitch2.12-test-0:2.12.0-12.el7fdp
  • python-openvswitch2.12-0:2.12.0-12.el7fdp
  • network-scripts-openvswitch2.11-0:2.11.0-35.el8fdp
  • openvswitch2.11-0:2.11.0-35.el8fdp
  • openvswitch2.11-debuginfo-0:2.11.0-35.el8fdp
  • openvswitch2.11-debugsource-0:2.11.0-35.el8fdp
  • openvswitch2.11-devel-0:2.11.0-35.el8fdp
  • openvswitch2.11-test-0:2.11.0-35.el8fdp
  • python3-openvswitch2.11-0:2.11.0-35.el8fdp
  • python3-openvswitch2.11-debuginfo-0:2.11.0-35.el8fdp
  • network-scripts-openvswitch2.12-0:2.12.0-12.el8fdp
  • openvswitch2.12-0:2.12.0-12.el8fdp
  • openvswitch2.12-debuginfo-0:2.12.0-12.el8fdp
  • openvswitch2.12-debugsource-0:2.12.0-12.el8fdp
  • openvswitch2.12-devel-0:2.12.0-12.el8fdp
  • openvswitch2.12-test-0:2.12.0-12.el8fdp
  • python3-openvswitch2.12-0:2.12.0-12.el8fdp
  • python3-openvswitch2.12-debuginfo-0:2.12.0-12.el8fdp
  • dpdk-0:18.11.5-1.el7_8
  • dpdk-debuginfo-0:18.11.5-1.el7_8
  • dpdk-devel-0:18.11.5-1.el7_8
  • dpdk-doc-0:18.11.5-1.el7_8
  • dpdk-tools-0:18.11.5-1.el7_8
  • dpdk-0:19.11-4.el8
  • dpdk-debuginfo-0:19.11-4.el8
  • dpdk-debugsource-0:19.11-4.el8
  • dpdk-devel-0:19.11-4.el8
  • dpdk-devel-debuginfo-0:19.11-4.el8
  • dpdk-doc-0:19.11-4.el8
  • dpdk-tools-0:19.11-4.el8