Vulnerabilities > CVE-2019-14850 - Insufficient Control of Network Message Volume (Network Amplification) vulnerability in multiple products

047910
CVSS 3.7 - LOW
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
LOW
network
high complexity
nbdkit-project
redhat
CWE-406
nessus

Summary

A denial of service vulnerability was discovered in nbdkit 1.12.7, 1.14.1 and 1.15.1. An attacker could connect to the nbdkit service and cause it to perform a large amount of work in initializing backend plugins, by simply opening a connection to the service. This vulnerability could cause resource consumption and degradation of service in nbdkit, depending on the plugins configured on the server-side.

Vulnerable Configurations

Part Description Count
Application
Nbdkit_Project
122
Application
Redhat
1
OS
Redhat
3

Nessus

  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2020-1167.NASL
    descriptionThe remote Redhat Enterprise Linux 7 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:1167 advisory. - nbdkit: denial of service due to premature opening of back-end connection (CVE-2019-14850) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-04-04
    modified2020-04-01
    plugin id135074
    published2020-04-01
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/135074
    titleRHEL 7 : nbdkit (RHSA-2020:1167)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Red Hat Security Advisory RHSA-2020:1167. The text
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include('compat.inc');
    
    if (description)
    {
      script_id(135074);
      script_version("1.1");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/04/01");
    
      script_cve_id("CVE-2019-14850");
      script_xref(name:"RHSA", value:"2020:1167");
    
      script_name(english:"RHEL 7 : nbdkit (RHSA-2020:1167)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Red Hat host is missing a security update.");
      script_set_attribute(attribute:"description", value:
    "The remote Redhat Enterprise Linux 7 host has packages installed that are affected by a vulnerability as referenced in
    the RHSA-2020:1167 advisory.
    
      - nbdkit: denial of service due to premature opening of
        back-end connection (CVE-2019-14850)
    
    Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
    number.");
      script_set_attribute(attribute:"see_also", value:"https://cwe.mitre.org/data/definitions/406.html");
      script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2020:1167");
      script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/CVE-2019-14850");
      script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/1724242");
      script_set_attribute(attribute:"solution", value:
    "Update the affected packages.");
      script_set_attribute(attribute:"risk_factor", value:"Low");
      script_cwe_id(406);
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2020/03/31");
      script_set_attribute(attribute:"patch_publication_date", value:"2020/03/31");
      script_set_attribute(attribute:"plugin_publication_date", value:"2020/04/01");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7::server");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:nbdkit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:nbdkit-basic-plugins");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:nbdkit-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:nbdkit-example-plugins");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:nbdkit-plugin-python-common");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:nbdkit-plugin-python2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:nbdkit-plugin-vddk");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Red Hat Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include('audit.inc');
    include('global_settings.inc');
    include('misc_func.inc');
    include('rpm.inc');
    
    if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item('Host/RedHat/release');
    if (isnull(release) || 'Red Hat' >!< release) audit(AUDIT_OS_NOT, 'Red Hat');
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, 'Red Hat 7.x', 'Red Hat ' + os_ver);
    
    if (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item('Host/cpu');
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);
    
    pkgs = [
        {'reference':'nbdkit-1.8.0-3.el7', 'cpu':'x86_64', 'release':'7'},
        {'reference':'nbdkit-basic-plugins-1.8.0-3.el7', 'cpu':'x86_64', 'release':'7'},
        {'reference':'nbdkit-devel-1.8.0-3.el7', 'cpu':'x86_64', 'release':'7'},
        {'reference':'nbdkit-example-plugins-1.8.0-3.el7', 'cpu':'x86_64', 'release':'7'},
        {'reference':'nbdkit-plugin-python-common-1.8.0-3.el7', 'cpu':'x86_64', 'release':'7'},
        {'reference':'nbdkit-plugin-python2-1.8.0-3.el7', 'cpu':'x86_64', 'release':'7'},
        {'reference':'nbdkit-plugin-vddk-1.8.0-3.el7', 'cpu':'x86_64', 'release':'7'}
    ];
    
    flag = 0;
    foreach package_array ( pkgs ) {
      reference = NULL;
      release = NULL;
      sp = NULL;
      cpu = NULL;
      el_string = NULL;
      rpm_spec_vers_cmp = NULL;
      epoch = NULL;
      if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
      if (!empty_or_null(package_array['release'])) release = 'RHEL' + package_array['release'];
      if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];
      if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];
      if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];
      if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];
      if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];
      if (reference && release) {
        if (rpm_spec_vers_cmp) {
          if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:TRUE)) flag++;
        }
        else
        {
          if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch)) flag++;
        }
      }
    }
    
    if (flag)
    {
      security_report_v4(
          port       : 0,
          severity   : SECURITY_NOTE,
          extra      : rpm_report_get() + redhat_report_package_caveat()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'nbdkit / nbdkit-basic-plugins / nbdkit-devel / etc');
    }
    
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2020-1167.NASL
    descriptionThe remote Redhat Enterprise Linux 7 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:1167 advisory. - nbdkit: denial of service due to premature opening of back-end connection (CVE-2019-14850) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-06
    modified2020-04-10
    plugin id135348
    published2020-04-10
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/135348
    titleCentOS 7 : nbdkit (CESA-2020:1167)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2020:1167 and 
    # CentOS Errata and Security Advisory 2020:1167 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(135348);
      script_version("1.2");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/05");
    
      script_cve_id("CVE-2019-14850");
      script_xref(name:"RHSA", value:"2020:1167");
    
      script_name(english:"CentOS 7 : nbdkit (CESA-2020:1167)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis",
        value:"The remote CentOS host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description",
        value:
    "The remote Redhat Enterprise Linux 7 host has packages installed that are affected by a vulnerability as referenced in
    the RHSA-2020:1167 advisory.
    
      - nbdkit: denial of service due to premature opening of
        back-end connection (CVE-2019-14850)
    
    Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
    number."
      );
      # https://lists.centos.org/pipermail/centos-cr-announce/2020-April/012538.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?5282b40b"
      );
      script_set_attribute(
        attribute:"solution",
        value:"Update the affected nbdkit packages."
      );
      script_set_attribute(attribute:"risk_factor", value:"Low");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:nbdkit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:nbdkit-basic-plugins");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:nbdkit-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:nbdkit-example-plugins");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:nbdkit-plugin-python-common");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:nbdkit-plugin-python2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:nbdkit-plugin-vddk");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:7");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2020/04/08");
      script_set_attribute(attribute:"plugin_publication_date", value:"2020/04/10");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"CentOS Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/CentOS/release", "Host/CentOS/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/CentOS/release");
    if (isnull(release) || "CentOS" >!< release) audit(AUDIT_OS_NOT, "CentOS");
    os_ver = pregmatch(pattern: "CentOS(?: Linux)? release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "CentOS");
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "CentOS 7.x", "CentOS " + os_ver);
    
    if (!get_kb_item("Host/CentOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "CentOS", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"nbdkit-1.8.0-3.el7")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"nbdkit-basic-plugins-1.8.0-3.el7")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"nbdkit-devel-1.8.0-3.el7")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"nbdkit-example-plugins-1.8.0-3.el7")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"nbdkit-plugin-python-common-1.8.0-3.el7")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"nbdkit-plugin-python2-1.8.0-3.el7")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"nbdkit-plugin-vddk-1.8.0-3.el7")) flag++;
    
    
    if (flag)
    {
      cr_plugin_caveat = '\n' +
        'NOTE: The security advisory associated with this vulnerability has a\n' +
        'fixed package version that may only be available in the continuous\n' +
        'release (CR) repository for CentOS, until it is present in the next\n' +
        'point release of CentOS.\n\n' +
    
        'If an equal or higher package level does not exist in the baseline\n' +
        'repository for your major version of CentOS, then updates from the CR\n' +
        'repository will need to be applied in order to address the\n' +
        'vulnerability.\n';
      security_report_v4(
        port       : 0,
        severity   : SECURITY_NOTE,
        extra      : rpm_report_get() + cr_plugin_caveat
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "nbdkit / nbdkit-basic-plugins / nbdkit-devel / etc");
    }
    
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20200407_NBDKIT_ON_SL7_X.NASL
    description* nbdkit: denial of service due to premature opening of back-end connection
    last seen2020-04-23
    modified2020-04-21
    plugin id135824
    published2020-04-21
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/135824
    titleScientific Linux Security Update : nbdkit on SL7.x x86_64 (20200407)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text is (C) Scientific Linux.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(135824);
      script_version("1.1");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/04/21");
    
      script_cve_id("CVE-2019-14850");
    
      script_name(english:"Scientific Linux Security Update : nbdkit on SL7.x x86_64 (20200407)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Scientific Linux host is missing one or more security
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "* nbdkit: denial of service due to premature opening of back-end
    connection"
      );
      # https://listserv.fnal.gov/scripts/wa.exe?A2=ind2004&L=SCIENTIFIC-LINUX-ERRATA&P=17695
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?ec8c828a"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_attribute(attribute:"risk_factor", value:"High");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:nbdkit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:nbdkit-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:nbdkit-plugin-python-common");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:nbdkit-plugin-python2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:nbdkit-plugin-vddk");
      script_set_attribute(attribute:"cpe", value:"x-cpe:/o:fermilab:scientific_linux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2020/04/07");
      script_set_attribute(attribute:"plugin_publication_date", value:"2020/04/21");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Scientific Linux Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Scientific Linux " >!< release) audit(AUDIT_HOST_NOT, "running Scientific Linux");
    os_ver = pregmatch(pattern: "Scientific Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Scientific Linux");
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Scientific Linux 7.x", "Scientific Linux " + os_ver);
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Scientific Linux", cpu);
    if ("x86_64" >!< cpu) audit(AUDIT_ARCH_NOT, "x86_64", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"nbdkit-1.8.0-3.el7")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"nbdkit-debuginfo-1.8.0-3.el7")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"nbdkit-plugin-python-common-1.8.0-3.el7")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"nbdkit-plugin-python2-1.8.0-3.el7")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"nbdkit-plugin-vddk-1.8.0-3.el7")) flag++;
    
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "nbdkit / nbdkit-debuginfo / nbdkit-plugin-python-common / etc");
    }
    

Redhat

advisories
bugzilla
id1757258
titleCVE-2019-14850 nbdkit: denial of service due to premature opening of back-end connection
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 7 is installed
      ovaloval:com.redhat.rhba:tst:20150364027
    • OR
      • AND
        • commentnbdkit-plugin-vddk is earlier than 0:1.8.0-3.el7
          ovaloval:com.redhat.rhsa:tst:20201167001
        • commentnbdkit-plugin-vddk is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20191175068
      • AND
        • commentnbdkit-plugin-python2 is earlier than 0:1.8.0-3.el7
          ovaloval:com.redhat.rhsa:tst:20201167003
        • commentnbdkit-plugin-python2 is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20201167004
      • AND
        • commentnbdkit-plugin-python-common is earlier than 0:1.8.0-3.el7
          ovaloval:com.redhat.rhsa:tst:20201167005
        • commentnbdkit-plugin-python-common is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20191175072
      • AND
        • commentnbdkit is earlier than 0:1.8.0-3.el7
          ovaloval:com.redhat.rhsa:tst:20201167007
        • commentnbdkit is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20191175084
      • AND
        • commentnbdkit-example-plugins is earlier than 0:1.8.0-3.el7
          ovaloval:com.redhat.rhsa:tst:20201167009
        • commentnbdkit-example-plugins is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20191175076
      • AND
        • commentnbdkit-devel is earlier than 0:1.8.0-3.el7
          ovaloval:com.redhat.rhsa:tst:20201167011
        • commentnbdkit-devel is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20191175078
      • AND
        • commentnbdkit-basic-plugins is earlier than 0:1.8.0-3.el7
          ovaloval:com.redhat.rhsa:tst:20201167013
        • commentnbdkit-basic-plugins is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20191175082
rhsa
idRHSA-2020:1167
released2020-03-31
severityLow
titleRHSA-2020:1167: nbdkit security and bug fix update (Low)
rpms
  • nbdkit-0:1.8.0-3.el7
  • nbdkit-basic-plugins-0:1.8.0-3.el7
  • nbdkit-debuginfo-0:1.8.0-3.el7
  • nbdkit-devel-0:1.8.0-3.el7
  • nbdkit-example-plugins-0:1.8.0-3.el7
  • nbdkit-plugin-python-common-0:1.8.0-3.el7
  • nbdkit-plugin-python2-0:1.8.0-3.el7
  • nbdkit-plugin-vddk-0:1.8.0-3.el7