Hello community,

here is the log from the commit of package patchinfo.14292 for 
openSUSE:Leap:15.1:Update checked in at 2020-10-03 06:23:08
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Leap:15.1:Update/patchinfo.14292 (Old)
 and      /work/SRC/openSUSE:Leap:15.1:Update/.patchinfo.14292.new.4249 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "patchinfo.14292"

Sat Oct  3 06:23:08 2020 rev:1 rq:838630 version:unknown

Changes:
--------
New Changes file:

NO CHANGES FILE!!!

New:
----
  _patchinfo

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ _patchinfo ++++++
<patchinfo incident="14292">
  <issue tracker="bnc" id="1176590">VUL-0: EMBARGOED: 
CVE-2020-14374,CVE-2020-14375,CVE-2020-14376,CVE-2020-14377,CVE-2020-14378: 
dpdk: VM escape</issue>
  <issue tracker="cve" id="2020-14374"/>
  <issue tracker="cve" id="2020-14375"/>
  <issue tracker="cve" id="2020-14376"/>
  <issue tracker="cve" id="2020-14377"/>
  <issue tracker="cve" id="2020-14378"/>
  <packager>jaicaa</packager>
  <rating>critical</rating>
  <category>security</category>
  <summary>Security update for dpdk</summary>
  <description>This update for dpdk fixes the following issues:

- dpdk was updated to 18.11.9. For a list of fixes check:
  - CVE-2020-14374,CVE-2020-14375,CVE-2020-14376,CVE-2020-14377,CVE-2020-14378: 
Fixed multiple issues where a malicious guest could 
    harm the host using vhost crypto, including executing code in host (VM 
Escape), reading host application memory space to guest 
    and causing partially denial of service in the host(bsc#1176590).
For a list of fixes check:    
    https://doc.dpdk.org/guides-18.11/rel_notes/release_18_11.html#fixes

This update was imported from the SUSE:SLE-15-SP1:Update update 
project.</description>
</patchinfo>

Reply via email to