openSUSE Security Update: Security update for dpdk-thunderxdpdk
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:1560-1
Rating: moderate
References: #1089638
Cross-References: CVE-2018-1059
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update fixes the following issues:
– CVE-2018-1059: The DPDK vhost-user interface did not check to verify
that all the requested guest physical range was mapped and contiguous
when performing Guest Physical Addresses to Host Virtual Addresses
translations. This may have lead to a malicious guest exposing
vhost-user backend process memory (bsc#1089638).
This update was imported from the SUSE:SLE-12-SP3:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-558=1
Package List:
– openSUSE Leap 42.3 (i586 x86_64):
dpdk-16.11.6-6.5.1
dpdk-debuginfo-16.11.6-6.5.1
dpdk-debugsource-16.11.6-6.5.1
dpdk-devel-16.11.6-6.5.1
dpdk-devel-debuginfo-16.11.6-6.5.1
dpdk-examples-16.11.6-6.5.1
dpdk-examples-debuginfo-16.11.6-6.5.1
dpdk-tools-16.11.6-6.5.1
– openSUSE Leap 42.3 (x86_64):
dpdk-kmp-default-16.11.6_k4.4.132_53-6.5.1
dpdk-kmp-default-debuginfo-16.11.6_k4.4.132_53-6.5.1
– openSUSE Leap 42.3 (noarch):
dpdk-doc-16.11.6-6.5.1
References:
https://www.suse.com/security/cve/CVE-2018-1059.html
https://bugzilla.suse.com/1089638
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org