Security update for dpdk
Announcement ID: | SUSE-SU-2020:2769-1 |
---|---|
Rating: | critical |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves five vulnerabilities can now be installed.
Description:
This update for dpdk fixes the following issues:
- dpdk was updated to 18.11.9. For a list of fixes check:
- CVE-2020-14374,CVE-2020-14375,CVE-2020-14376,CVE-2020-14377,CVE-2020-14378: Fixed multiple issues where a malicious guest could
harm the host using vhost crypto, including executing code in host (VM Escape), reading host application memory space to guest
and causing partially denial of service in the host(bsc#1176590).
For a list of fixes check:
https://doc.dpdk.org/guides-18.11/rel_notes/release_18_11.html#fixes
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Server Applications Module 15-SP1
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP1-2020-2769=1
Package List:
-
Server Applications Module 15-SP1 (aarch64 ppc64le x86_64)
- dpdk-kmp-default-debuginfo-18.11.9_k4.12.14_197.56-4.12.1
- dpdk-tools-debuginfo-18.11.9-4.12.1
- dpdk-18.11.9-4.12.1
- libdpdk-18_11-debuginfo-18.11.9-4.12.1
- dpdk-devel-18.11.9-4.12.1
- dpdk-kmp-default-18.11.9_k4.12.14_197.56-4.12.1
- dpdk-tools-18.11.9-4.12.1
- libdpdk-18_11-18.11.9-4.12.1
- dpdk-debuginfo-18.11.9-4.12.1
- dpdk-devel-debuginfo-18.11.9-4.12.1
- dpdk-debugsource-18.11.9-4.12.1
References:
- https://www.suse.com/security/cve/CVE-2020-14374.html
- https://www.suse.com/security/cve/CVE-2020-14375.html
- https://www.suse.com/security/cve/CVE-2020-14376.html
- https://www.suse.com/security/cve/CVE-2020-14377.html
- https://www.suse.com/security/cve/CVE-2020-14378.html
- https://bugzilla.suse.com/show_bug.cgi?id=1176590