SB2020052624 - Red Hat Enterprise Linux Fast Datapath update for openvswitch
Published: May 26, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2020-10722)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in check log functionality. A remote attacker can pass specially crafted input to the application, trigger mmap offset and perform a denial of service (DoS) attack.
2) Input validation error (CVE-ID: CVE-2020-10723)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of translated addresses. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
3) Cryptographic issues (CVE-ID: CVE-2020-10724)
The vulnerability allows a remote attacker to bypass certain security restrictions.
The vulnerability exists due to incorrect validation of keys lengths. A remote attacker can bypass certain security restrictions.
4) Memory leak (CVE-ID: CVE-2020-10725)
The vulnerability allows a remote attacker to perform DoS attack on the target system.
The vulnerability exists due memory leak. A remote attacker can force the application to leak memory and perform denial of service attack.
5) Memory leak (CVE-ID: CVE-2020-10726)
The vulnerability allows a remote attacker to perform DoS attack on the target system.
The vulnerability exists due memory leak, related to fd leak and vring index check. A remote attacker can force the application to leak memory and read sensitive information or perform denial of service attack.
Remediation
Install update from vendor's website.