Linux Security
    Linux Security
    Linux Security

    SUSE: 2020:2769-1 critical: dpdk

    Date
    82
    Posted By
    An update that fixes 5 vulnerabilities is now available.
    
       SUSE Security Update: Security update for dpdk
    ______________________________________________________________________________
    
    Announcement ID:    SUSE-SU-2020:2769-1
    Rating:             critical
    References:         #1176590 
    Cross-References:   CVE-2020-14374 CVE-2020-14375 CVE-2020-14376
                        CVE-2020-14377 CVE-2020-14378
    Affected Products:
                        SUSE Linux Enterprise Module for Server Applications 15-SP1
    ______________________________________________________________________________
    
       An update that fixes 5 vulnerabilities is now available.
    
    Description:
    
       This update for dpdk fixes the following issues:
    
       - dpdk was updated to 18.11.9. For a list of fixes check:
         -
       CVE-2020-14374,CVE-2020-14375,CVE-2020-14376,CVE-2020-14377,CVE-2020-14378:
            Fixed multiple issues where a malicious guest could harm the host
           using vhost crypto, including executing code in host (VM Escape),
           reading host application memory space to guest and causing partially
           denial of service in the host(bsc#1176590). For a list of fixes check:
           https://doc.dpdk.org/guides-18.11/rel_notes/release_18_11.html#fixes
    
    
    Patch Instructions:
    
       To install this SUSE Security Update use the SUSE recommended installation methods
       like YaST online_update or "zypper patch".
    
       Alternatively you can run the command listed for your product:
    
       - SUSE Linux Enterprise Module for Server Applications 15-SP1:
    
          zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP1-2020-2769=1
    
    
    
    Package List:
    
       - SUSE Linux Enterprise Module for Server Applications 15-SP1 (aarch64 ppc64le x86_64):
    
          dpdk-18.11.9-4.12.1
          dpdk-debuginfo-18.11.9-4.12.1
          dpdk-debugsource-18.11.9-4.12.1
          dpdk-devel-18.11.9-4.12.1
          dpdk-devel-debuginfo-18.11.9-4.12.1
          dpdk-kmp-default-18.11.9_k4.12.14_197.56-4.12.1
          dpdk-kmp-default-debuginfo-18.11.9_k4.12.14_197.56-4.12.1
          dpdk-tools-18.11.9-4.12.1
          dpdk-tools-debuginfo-18.11.9-4.12.1
          libdpdk-18_11-18.11.9-4.12.1
          libdpdk-18_11-debuginfo-18.11.9-4.12.1
    
    
    References:
    
       https://www.suse.com/security/cve/CVE-2020-14374.html
       https://www.suse.com/security/cve/CVE-2020-14375.html
       https://www.suse.com/security/cve/CVE-2020-14376.html
       https://www.suse.com/security/cve/CVE-2020-14377.html
       https://www.suse.com/security/cve/CVE-2020-14378.html
       https://bugzilla.suse.com/1176590
    
    _______________________________________________
    sle-security-updates mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://lists.suse.com/mailman/listinfo/sle-security-updates
    

    LinuxSecurity Poll

    Which statement best describes how you feel about the recent Linux 5.9 release?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/40-what-change-are-you-most-excited-about-in-linux-5-9?task=poll.vote&format=json
    40
    radio
    [{"id":"140","title":"Not a game-changer for me.","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"141","title":"I'm happy with the performance improvements it offers.","votes":"3","type":"x","order":"2","pct":100,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.