SUSE: 2020:1335-1 moderate: dpdk
Summary
This update for dpdk fixes the following issues: Security issues fixed: - CVE-2020-10722: Fixed an integer overflow in vhost_user_set_log_base() (bsc#1171477). - CVE-2020-10723: Fixed an integer truncation in vhost_user_check_and_alloc_queue_pair() (bsc#1171477). - CVE-2020-10724: Fixed a missing inputs validation in Vhost-crypto (bsc#1171477). - CVE-2020-10725: Fixed a segfault caused by invalid virtio descriptors sent from a malicious guest (bsc#1171477). - CVE-2020-10726: Fixed a denial-of-service caused by VHOST_USER_GET_INFLIGHT_FD message flooding (bsc#1171477). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Server Applications 15-SP1: zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP1-2020-1335=1 ...
Read the Full AdvisoryReferences
#1171477
Cross- CVE-2020-10722 CVE-2020-10723 CVE-2020-10724
CVE-2020-10725 CVE-2020-10726
Affected Products:
SUSE Linux Enterprise Module for Server Applications 15-SP1
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1
https://www.suse.com/security/cve/CVE-2020-10722.html
https://www.suse.com/security/cve/CVE-2020-10723.html
https://www.suse.com/security/cve/CVE-2020-10724.html
https://www.suse.com/security/cve/CVE-2020-10725.html
https://www.suse.com/security/cve/CVE-2020-10726.html
https://bugzilla.suse.com/1171477