openSUSE Security Update: Security update for dpdk-thunderxdpdk
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2018:1560-1
Rating:             moderate
References:         #1089638 
Cross-References:   CVE-2018-1059
Affected Products:
                    openSUSE Leap 42.3
______________________________________________________________________________

   An update that fixes one vulnerability is now available.

Description:


     This update fixes the following issues:

   - CVE-2018-1059: The DPDK vhost-user interface did not check to verify
     that all the requested guest physical range was mapped and contiguous
     when performing Guest Physical Addresses to Host Virtual Addresses
     translations. This may have lead to a malicious guest exposing
     vhost-user backend process memory (bsc#1089638).

   This update was imported from the SUSE:SLE-12-SP3:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 42.3:

      zypper in -t patch openSUSE-2018-558=1



Package List:

   - openSUSE Leap 42.3 (i586 x86_64):

      dpdk-16.11.6-6.5.1
      dpdk-debuginfo-16.11.6-6.5.1
      dpdk-debugsource-16.11.6-6.5.1
      dpdk-devel-16.11.6-6.5.1
      dpdk-devel-debuginfo-16.11.6-6.5.1
      dpdk-examples-16.11.6-6.5.1
      dpdk-examples-debuginfo-16.11.6-6.5.1
      dpdk-tools-16.11.6-6.5.1

   - openSUSE Leap 42.3 (x86_64):

      dpdk-kmp-default-16.11.6_k4.4.132_53-6.5.1
      dpdk-kmp-default-debuginfo-16.11.6_k4.4.132_53-6.5.1

   - openSUSE Leap 42.3 (noarch):

      dpdk-doc-16.11.6-6.5.1


References:

   https://www.suse.com/security/cve/CVE-2018-1059.html
   https://bugzilla.suse.com/1089638

-- 

openSUSE: 2018:1560-1: moderate: dpdk-thunderxdpdk

June 6, 2018
An update that fixes one vulnerability is now available.

Description

This update fixes the following issues: - CVE-2018-1059: The DPDK vhost-user interface did not check to verify that all the requested guest physical range was mapped and contiguous when performing Guest Physical Addresses to Host Virtual Addresses translations. This may have lead to a malicious guest exposing vhost-user backend process memory (bsc#1089638). This update was imported from the SUSE:SLE-12-SP3:Update update project.

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 42.3: zypper in -t patch openSUSE-2018-558=1


Package List

- openSUSE Leap 42.3 (i586 x86_64): dpdk-16.11.6-6.5.1 dpdk-debuginfo-16.11.6-6.5.1 dpdk-debugsource-16.11.6-6.5.1 dpdk-devel-16.11.6-6.5.1 dpdk-devel-debuginfo-16.11.6-6.5.1 dpdk-examples-16.11.6-6.5.1 dpdk-examples-debuginfo-16.11.6-6.5.1 dpdk-tools-16.11.6-6.5.1 - openSUSE Leap 42.3 (x86_64): dpdk-kmp-default-16.11.6_k4.4.132_53-6.5.1 dpdk-kmp-default-debuginfo-16.11.6_k4.4.132_53-6.5.1 - openSUSE Leap 42.3 (noarch): dpdk-doc-16.11.6-6.5.1


References

https://www.suse.com/security/cve/CVE-2018-1059.html https://bugzilla.suse.com/1089638--


Severity
Announcement ID: openSUSE-SU-2018:1560-1
Rating: moderate
Affected Products: openSUSE Leap 42.3

Related News