Login
Newsletter
Werbung

Sicherheit: Preisgabe von Informationen in dpdk-thunderxdpdk
Aktuelle Meldungen Distributionen
Name: Preisgabe von Informationen in dpdk-thunderxdpdk
ID: openSUSE-SU-2018:1560-1
Distribution: SUSE
Plattformen: SUSE openSUSE Leap 42.3
Datum: Mi, 6. Juni 2018, 06:52
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1059
Applikationen: dpdk-thunderxdpdk

Originalnachricht

   openSUSE Security Update: Security update for dpdk-thunderxdpdk
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:1560-1
Rating: moderate
References: #1089638
Cross-References: CVE-2018-1059
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:


This update fixes the following issues:

- CVE-2018-1059: The DPDK vhost-user interface did not check to verify
that all the requested guest physical range was mapped and contiguous
when performing Guest Physical Addresses to Host Virtual Addresses
translations. This may have lead to a malicious guest exposing
vhost-user backend process memory (bsc#1089638).

This update was imported from the SUSE:SLE-12-SP3:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended
installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-558=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

dpdk-16.11.6-6.5.1
dpdk-debuginfo-16.11.6-6.5.1
dpdk-debugsource-16.11.6-6.5.1
dpdk-devel-16.11.6-6.5.1
dpdk-devel-debuginfo-16.11.6-6.5.1
dpdk-examples-16.11.6-6.5.1
dpdk-examples-debuginfo-16.11.6-6.5.1
dpdk-tools-16.11.6-6.5.1

- openSUSE Leap 42.3 (x86_64):

dpdk-kmp-default-16.11.6_k4.4.132_53-6.5.1
dpdk-kmp-default-debuginfo-16.11.6_k4.4.132_53-6.5.1

- openSUSE Leap 42.3 (noarch):

dpdk-doc-16.11.6-6.5.1


References:

https://www.suse.com/security/cve/CVE-2018-1059.html
https://bugzilla.suse.com/1089638

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung