SUSE: 2020:2769-1 critical: dpdk
Summary
This update for dpdk fixes the following issues: - dpdk was updated to 18.11.9. For a list of fixes check: - CVE-2020-14374,CVE-2020-14375,CVE-2020-14376,CVE-2020-14377,CVE-2020-14378: Fixed multiple issues where a malicious guest could harm the host using vhost crypto, including executing code in host (VM Escape), reading host application memory space to guest and causing partially denial of service in the host(bsc#1176590). For a list of fixes check: https://doc.dpdk.org/guides-18.11/rel_notes/release_18_11.html#fixes Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Server Applications 15-SP1: zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP1-2020-2769=1 Package List: - SUSE Linux Enterprise Module for Server Applications 15-SP1 (aarch64 ppc64le x86_64): dpdk-18.11.9-4.12.1 dpdk-debuginfo-18.11.9-4.12.1 dpdk-debugsource-18.11.9-4.12.1 dpdk-devel-18.11.9-4.12.1 dpdk-devel-debuginfo-18.11.9-4.12.1 dpdk-kmp-default-18.11.9_k4.12.14_197.56-4.12.1 dpdk-kmp-default-debuginfo-18.11.9_k4.12.14_197.56-4.12.1 dpdk-tools-18.11.9-4.12.1 dpdk-tools-debuginfo-18.11.9-4.12.1 libdpdk-18_11-18.11.9-4.12.1 libdpdk-18_11-debuginfo-18.11.9-4.12.1
References
#1176590
Cross- CVE-2020-14374 CVE-2020-14375 CVE-2020-14376
CVE-2020-14377 CVE-2020-14378
Affected Products:
SUSE Linux Enterprise Module for Server Applications 15-SP1
https://www.suse.com/security/cve/CVE-2020-14374.html
https://www.suse.com/security/cve/CVE-2020-14375.html
https://www.suse.com/security/cve/CVE-2020-14376.html
https://www.suse.com/security/cve/CVE-2020-14377.html
https://www.suse.com/security/cve/CVE-2020-14378.html
https://bugzilla.suse.com/1176590