Bug 1737327 (CVE-2019-14818) - CVE-2019-14818 dpdk: possible memory leak leads to denial of service
Summary: CVE-2019-14818 dpdk: possible memory leak leads to denial of service
Status: NEW
Alias: CVE-2019-14818
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact: Jean-Tsung Hsiao
Depends On: 1760241 1760242 1760243 1760244 1760245 1760246 1760247 1760248 1760249 1771930 1773779 1773780 1777135 1777136 1760240 1771929 1773781 1773782
Blocks: 1731363
TreeView+ depends on / blocked
Reported: 2019-08-05 06:19 UTC by Dhananjay Arunesh
Modified: 2020-01-14 21:33 UTC (History)
42 users (show)

Fixed In Version: dpdk 17.11.8, dpdk 16.11.10, dpdk 18.11.4, dpdk 19.08.1
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in dpdk where a malicious master, or a container with access to vhost_user socket, can send specially crafted VRING_SET_NUM messages, resulting in a memory leak including file descriptors. This flaw could lead to a denial of service condition.
Clone Of:
Last Closed:

Attachments (Terms of Use)

Description Dhananjay Arunesh 2019-08-05 06:19:47 UTC
A vulnerability was found in dpdk where a malicious master keep sending VRING_SET_NUM message, all  the above memory will be leaked, and result a DOS finally since ret_malloc() won't allocate any memory.

Comment 6 Joshua Padman 2019-08-27 10:29:38 UTC

Name: Jason Wang (Red Hat)

Comment 8 Joshua Padman 2019-10-13 23:03:53 UTC

The dpdk package within Red Hat OpenStack Platform 10 has been superseded by the version included with RHEL Extras, fixes for dpdk will be consumed from here.

Comment 9 Joshua Padman 2019-11-13 09:23:58 UTC
External References:


Comment 11 Joshua Padman 2019-11-13 09:35:51 UTC
Created dpdk tracking bugs for this issue:

Affects: fedora-all [bug 1771929]

Created openvswitch tracking bugs for this issue:

Affects: openstack-rdo [bug 1771930]

Note You need to log in before you can comment on or make changes to this bug.