SUSE: 2020:1552-1 moderate: dpdk
Summary
This update for dpdk fixes the following issues: - CVE-2020-10722: Fixed an integer overflow in vhost_user_set_log_base() (bsc#1171930). - CVE-2020-10723: Fixed an integer truncation in vhost_user_check_and_alloc_queue_pair() (bsc#1171925). - CVE-2020-10724: Fixed a missing inputs validation in Vhost-crypto (bsc#1171926). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP5: zypper in -t patch SUSE-SLE-SDK-12-SP5-2020-1552=1 - SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-1552=1 Package List: - SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le x86_64): dpdk-debuginfo-18.11.3-3.9.2 dpdk-debugsource-18.11.3-3.9.2 dpdk-devel-18.11...
Read the Full AdvisoryReferences
#1171477 #1171925 #1171926 #1171930
Cross- CVE-2020-10722 CVE-2020-10723 CVE-2020-10724
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP5
SUSE Linux Enterprise Server 12-SP5
https://www.suse.com/security/cve/CVE-2020-10722.html
https://www.suse.com/security/cve/CVE-2020-10723.html
https://www.suse.com/security/cve/CVE-2020-10724.html
https://bugzilla.suse.com/1171477
https://bugzilla.suse.com/1171925
https://bugzilla.suse.com/1171926
https://bugzilla.suse.com/1171930