7.2 High
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
5.9 Medium
AI Score
Confidence
Low
0.001 Low
EPSS
Percentile
19.1%
This update for dpdk fixes the following issues :
dpdk was updated to 18.11.9. For a list of fixes check :
CVE-2020-14374,CVE-2020-14375,CVE-2020-14376,CVE-2020-14 377,CVE-2020-14378: Fixed multiple issues where a malicious guest could harm the host using vhost crypto, including executing code in host (VM Escape), reading host application memory space to guest and causing partially denial of service in the host(bsc#1176590).
For a list of fixes check:
https://doc.dpdk.org/guides-18.11/rel_notes/release_18_1 1.html#fixes
This update was imported from the SUSE:SLE-15-SP1:Update update project.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from openSUSE Security Update openSUSE-2020-1593.
#
# The text description of this plugin is (C) SUSE LLC.
#
include('compat.inc');
if (description)
{
script_id(141164);
script_version("1.5");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/02/16");
script_cve_id(
"CVE-2020-14374",
"CVE-2020-14375",
"CVE-2020-14376",
"CVE-2020-14377",
"CVE-2020-14378"
);
script_name(english:"openSUSE Security Update : dpdk (openSUSE-2020-1593)");
script_set_attribute(attribute:"synopsis", value:
"The remote openSUSE host is missing a security update.");
script_set_attribute(attribute:"description", value:
"This update for dpdk fixes the following issues :
- dpdk was updated to 18.11.9. For a list of fixes check :
-
CVE-2020-14374,CVE-2020-14375,CVE-2020-14376,CVE-2020-14
377,CVE-2020-14378: Fixed multiple issues where a
malicious guest could harm the host using vhost crypto,
including executing code in host (VM Escape), reading
host application memory space to guest and causing
partially denial of service in the host(bsc#1176590).
For a list of fixes check:
https://doc.dpdk.org/guides-18.11/rel_notes/release_18_1
1.html#fixes
This update was imported from the SUSE:SLE-15-SP1:Update update
project.");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1176590");
script_set_attribute(attribute:"see_also", value:"https://doc.dpdk.org/guides-18.11/rel_notes/release_18_11.html#fixes");
script_set_attribute(attribute:"solution", value:
"Update the affected dpdk packages.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-14374");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2020/09/30");
script_set_attribute(attribute:"patch_publication_date", value:"2020/10/03");
script_set_attribute(attribute:"plugin_publication_date", value:"2020/10/05");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:dpdk");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:dpdk-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:dpdk-debugsource");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:dpdk-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:dpdk-devel-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:dpdk-examples");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:dpdk-examples-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:dpdk-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:dpdk-kmp-default-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:dpdk-tools");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:dpdk-tools-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libdpdk-18_11");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libdpdk-18_11-debuginfo");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:15.1");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"SuSE Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
if (release !~ "^(SUSE15\.1)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "15.1", release);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
ourarch = get_kb_item("Host/cpu");
if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
if (ourarch !~ "^(x86_64)$") audit(AUDIT_ARCH_NOT, "x86_64", ourarch);
flag = 0;
if ( rpm_check(release:"SUSE15.1", reference:"dpdk-18.11.9-lp151.3.8.1") ) flag++;
if ( rpm_check(release:"SUSE15.1", reference:"dpdk-debuginfo-18.11.9-lp151.3.8.1") ) flag++;
if ( rpm_check(release:"SUSE15.1", reference:"dpdk-debugsource-18.11.9-lp151.3.8.1") ) flag++;
if ( rpm_check(release:"SUSE15.1", reference:"dpdk-devel-18.11.9-lp151.3.8.1") ) flag++;
if ( rpm_check(release:"SUSE15.1", reference:"dpdk-devel-debuginfo-18.11.9-lp151.3.8.1") ) flag++;
if ( rpm_check(release:"SUSE15.1", reference:"dpdk-examples-18.11.9-lp151.3.8.1") ) flag++;
if ( rpm_check(release:"SUSE15.1", reference:"dpdk-examples-debuginfo-18.11.9-lp151.3.8.1") ) flag++;
if ( rpm_check(release:"SUSE15.1", reference:"dpdk-kmp-default-18.11.9_k4.12.14_lp151.28.67-lp151.3.8.1") ) flag++;
if ( rpm_check(release:"SUSE15.1", reference:"dpdk-kmp-default-debuginfo-18.11.9_k4.12.14_lp151.28.67-lp151.3.8.1") ) flag++;
if ( rpm_check(release:"SUSE15.1", reference:"dpdk-tools-18.11.9-lp151.3.8.1") ) flag++;
if ( rpm_check(release:"SUSE15.1", reference:"dpdk-tools-debuginfo-18.11.9-lp151.3.8.1") ) flag++;
if ( rpm_check(release:"SUSE15.1", reference:"libdpdk-18_11-18.11.9-lp151.3.8.1") ) flag++;
if ( rpm_check(release:"SUSE15.1", reference:"libdpdk-18_11-debuginfo-18.11.9-lp151.3.8.1") ) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "dpdk / dpdk-debuginfo / dpdk-debugsource / dpdk-devel / etc");
}
Vendor | Product | Version | CPE |
---|---|---|---|
novell | opensuse | dpdk | p-cpe:/a:novell:opensuse:dpdk |
novell | opensuse | dpdk-debuginfo | p-cpe:/a:novell:opensuse:dpdk-debuginfo |
novell | opensuse | dpdk-debugsource | p-cpe:/a:novell:opensuse:dpdk-debugsource |
novell | opensuse | dpdk-devel | p-cpe:/a:novell:opensuse:dpdk-devel |
novell | opensuse | dpdk-devel-debuginfo | p-cpe:/a:novell:opensuse:dpdk-devel-debuginfo |
novell | opensuse | dpdk-examples | p-cpe:/a:novell:opensuse:dpdk-examples |
novell | opensuse | dpdk-examples-debuginfo | p-cpe:/a:novell:opensuse:dpdk-examples-debuginfo |
novell | opensuse | dpdk-kmp-default | p-cpe:/a:novell:opensuse:dpdk-kmp-default |
novell | opensuse | dpdk-kmp-default-debuginfo | p-cpe:/a:novell:opensuse:dpdk-kmp-default-debuginfo |
novell | opensuse | dpdk-tools | p-cpe:/a:novell:opensuse:dpdk-tools |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14374
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14375
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14376
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14377
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14378
bugzilla.opensuse.org/show_bug.cgi?id=1176590
doc.dpdk.org/guides-18.11/rel_notes/release_18_11.html#fixes
7.2 High
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
5.9 Medium
AI Score
Confidence
Low
0.001 Low
EPSS
Percentile
19.1%