Login
Newsletter
Werbung

Sicherheit: Preisgabe von Informationen in dpdk
Aktuelle Meldungen Distributionen
Name: Preisgabe von Informationen in dpdk
ID: openSUSE-SU-2018:4003-1
Distribution: SUSE
Plattformen: openSUSE Leap 42.3
Datum: Fr, 7. Dezember 2018, 13:27
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1059
Applikationen: DPDK

Originalnachricht

   openSUSE Security Update: Security update for dpdk
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:4003-1
Rating: moderate
References: #1069601 #1073363 #1089638 #1102310
Cross-References: CVE-2018-1059
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that solves one vulnerability and has three fixes
is now available.

Description:



This update for dpdk to version 16.11.8 provides the following security
fix:

- CVE-2018-1059: restrict untrusted guest to misuse virtio to corrupt host
application (ovs-dpdk) memory which could have lead all VM to lose
connectivity (bsc#1089638)

and following non-security fixes:

- Enable the broadcom chipset family Broadcom NetXtreme II BCM57810
(bsc#1073363)
- Fix a latency problem by using cond_resched rather than
schedule_timeout_interruptible (bsc#1069601)
- Fix a syntax error affecting csh environment configuration (bsc#1102310)
- Fixes in net/bnxt:
* Fix HW Tx checksum offload check
* Fix incorrect IO address handling in Tx
* Fix Rx ring count limitation
* Check access denied for HWRM commands
* Fix RETA size
* Fix close operation
- Fixes in eal/linux:
* Fix an invalid syntax in interrupts
* Fix return codes on thread naming failure
- Fixes in kni:
* Fix crash with null name
* Fix build with gcc 8.1
- Fixes in net/thunderx:
* Fix build with gcc optimization on
* Avoid sq door bell write on zero packet
- net/bonding: Fix MAC address reset
- vhost: Fix missing increment of log cache count

This update was imported from the SUSE:SLE-12-SP3:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended
installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-1484=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

dpdk-16.11.8-6.8.1
dpdk-debuginfo-16.11.8-6.8.1
dpdk-debugsource-16.11.8-6.8.1
dpdk-devel-16.11.8-6.8.1
dpdk-devel-debuginfo-16.11.8-6.8.1
dpdk-examples-16.11.8-6.8.1
dpdk-examples-debuginfo-16.11.8-6.8.1
dpdk-tools-16.11.8-6.8.1

- openSUSE Leap 42.3 (x86_64):

dpdk-kmp-default-16.11.8_k4.4.162_78-6.8.1
dpdk-kmp-default-debuginfo-16.11.8_k4.4.162_78-6.8.1

- openSUSE Leap 42.3 (noarch):

dpdk-doc-16.11.8-6.8.1


References:

https://www.suse.com/security/cve/CVE-2018-1059.html
https://bugzilla.suse.com/1069601
https://bugzilla.suse.com/1073363
https://bugzilla.suse.com/1089638
https://bugzilla.suse.com/1102310

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung