Bug 1737327 (CVE-2019-14818)

Summary: CVE-2019-14818 dpdk: possible memory leak leads to denial of service
Product: [Other] Security Response Reporter: Dhananjay Arunesh <darunesh>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact: Jean-Tsung Hsiao <jhsiao>
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aconole, apevec, cfontain, chrisw, ctrautma, dbecker, dblechte, dfediuck, eedri, fleitner, hvyas, jhsiao, jjoyce, jpadman, jschluet, kbasil, kfida, lhh, linville, lpeer, maxime.coquelin, mburns, mgoldboi, michal.skrivanek, mmirecki, nhorman, nyechiel, ovs-qe, ovs-team, qding, ralongi, rhos-maint, rkhan, sbonazzo, sclewis, security-response-team, sherold, sisharma, slinaber, srevivo, tredaelli, yturgema
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: dpdk 17.11.8, dpdk 16.11.10, dpdk 18.11.4, dpdk 19.08.1 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in dpdk where a malicious master, or a container with access to vhost_user socket, can send specially crafted VRING_SET_NUM messages, resulting in a memory leak including file descriptors. This flaw could lead to a denial of service condition.
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-01-21 08:09:31 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1760240, 1760241, 1760242, 1760243, 1760244, 1760245, 1760246, 1760247, 1760248, 1760249, 1771929, 1771930, 1773779, 1773780, 1773781, 1773782, 1777135, 1777136, 1793219    
Bug Blocks: 1731363    

Description Dhananjay Arunesh 2019-08-05 06:19:47 UTC
A vulnerability was found in dpdk where a malicious master keep sending VRING_SET_NUM message, all  the above memory will be leaked, and result a DOS finally since ret_malloc() won't allocate any memory.

Comment 6 Joshua Padman 2019-08-27 10:29:38 UTC
Acknowledgments:

Name: Jason Wang (Red Hat)

Comment 8 Joshua Padman 2019-10-13 23:03:53 UTC
Statement:

The dpdk package within Red Hat OpenStack Platform 10 has been superseded by the version included with RHEL Extras, fixes for dpdk will be consumed from here.

Comment 9 Joshua Padman 2019-11-13 09:23:58 UTC
External References:

https://bugs.dpdk.org/show_bug.cgi?id=363

Comment 11 Joshua Padman 2019-11-13 09:35:51 UTC
Created dpdk tracking bugs for this issue:

Affects: fedora-all [bug 1771929]


Created openvswitch tracking bugs for this issue:

Affects: openstack-rdo [bug 1771930]

Comment 25 errata-xmlrpc 2020-01-21 06:33:51 UTC
This issue has been addressed in the following products:

  Fast Datapath for RHEL 7

Via RHSA-2020:0165 https://access.redhat.com/errata/RHSA-2020:0165

Comment 26 errata-xmlrpc 2020-01-21 06:34:12 UTC
This issue has been addressed in the following products:

  Fast Datapath for RHEL 7

Via RHSA-2020:0166 https://access.redhat.com/errata/RHSA-2020:0166

Comment 27 Product Security DevOps Team 2020-01-21 08:09:31 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-14818

Comment 28 errata-xmlrpc 2020-01-21 16:04:54 UTC
This issue has been addressed in the following products:

  Fast Datapath for RHEL 7

Via RHSA-2020:0168 https://access.redhat.com/errata/RHSA-2020:0168

Comment 29 errata-xmlrpc 2020-01-22 04:02:46 UTC
This issue has been addressed in the following products:

  Fast Datapath for RHEL 8

Via RHSA-2020:0171 https://access.redhat.com/errata/RHSA-2020:0171

Comment 30 errata-xmlrpc 2020-01-22 04:03:47 UTC
This issue has been addressed in the following products:

  Fast Datapath for RHEL 8

Via RHSA-2020:0172 https://access.redhat.com/errata/RHSA-2020:0172

Comment 31 errata-xmlrpc 2020-04-01 00:25:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Extras

Via RHSA-2020:1226 https://access.redhat.com/errata/RHSA-2020:1226

Comment 32 errata-xmlrpc 2020-04-28 15:46:14 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:1735 https://access.redhat.com/errata/RHSA-2020:1735