openSUSE Security Update: Security update for dpdk
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2018:4003-1
Rating:             moderate
References:         #1069601 #1073363 #1089638 #1102310 
Cross-References:   CVE-2018-1059
Affected Products:
                    openSUSE Leap 42.3
______________________________________________________________________________

   An update that solves one vulnerability and has three fixes
   is now available.

Description:



   This update for dpdk to version 16.11.8 provides the following security
   fix:

   - CVE-2018-1059: restrict untrusted guest to misuse virtio to corrupt host
     application (ovs-dpdk) memory which could have lead all VM to lose
     connectivity (bsc#1089638)

   and following non-security fixes:

   - Enable the broadcom chipset family Broadcom NetXtreme II BCM57810
     (bsc#1073363)
   - Fix a latency problem by using cond_resched rather than
     schedule_timeout_interruptible (bsc#1069601)
   - Fix a syntax error affecting csh environment configuration (bsc#1102310)
   - Fixes in net/bnxt:
       * Fix HW Tx checksum offload check
       * Fix incorrect IO address handling in Tx
       * Fix Rx ring count limitation
       * Check access denied for HWRM commands
       * Fix RETA size
       * Fix close operation
   - Fixes in eal/linux:
       * Fix an invalid syntax in interrupts
       * Fix return codes on thread naming failure
   - Fixes in kni:
       * Fix crash with null name
       * Fix build with gcc 8.1
   - Fixes in net/thunderx:
       * Fix build with gcc optimization on
       * Avoid sq door bell write on zero packet
   - net/bonding: Fix MAC address reset
   - vhost: Fix missing increment of log cache count

   This update was imported from the SUSE:SLE-12-SP3:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 42.3:

      zypper in -t patch openSUSE-2018-1484=1



Package List:

   - openSUSE Leap 42.3 (i586 x86_64):

      dpdk-16.11.8-6.8.1
      dpdk-debuginfo-16.11.8-6.8.1
      dpdk-debugsource-16.11.8-6.8.1
      dpdk-devel-16.11.8-6.8.1
      dpdk-devel-debuginfo-16.11.8-6.8.1
      dpdk-examples-16.11.8-6.8.1
      dpdk-examples-debuginfo-16.11.8-6.8.1
      dpdk-tools-16.11.8-6.8.1

   - openSUSE Leap 42.3 (x86_64):

      dpdk-kmp-default-16.11.8_k4.4.162_78-6.8.1
      dpdk-kmp-default-debuginfo-16.11.8_k4.4.162_78-6.8.1

   - openSUSE Leap 42.3 (noarch):

      dpdk-doc-16.11.8-6.8.1


References:

   https://www.suse.com/security/cve/CVE-2018-1059.html
   https://bugzilla.suse.com/1069601
   https://bugzilla.suse.com/1073363
   https://bugzilla.suse.com/1089638
   https://bugzilla.suse.com/1102310

-- 

openSUSE: 2018:4003-1: moderate: dpdk

December 7, 2018
An update that solves one vulnerability and has three fixes is now available.

Description

This update for dpdk to version 16.11.8 provides the following security fix: - CVE-2018-1059: restrict untrusted guest to misuse virtio to corrupt host application (ovs-dpdk) memory which could have lead all VM to lose connectivity (bsc#1089638) and following non-security fixes: - Enable the broadcom chipset family Broadcom NetXtreme II BCM57810 (bsc#1073363) - Fix a latency problem by using cond_resched rather than schedule_timeout_interruptible (bsc#1069601) - Fix a syntax error affecting csh environment configuration (bsc#1102310) - Fixes in net/bnxt: * Fix HW Tx checksum offload check * Fix incorrect IO address handling in Tx * Fix Rx ring count limitation * Check access denied for HWRM commands * Fix RETA size * Fix close operation - Fixes in eal/linux: * Fix an invalid syntax in interrupts * Fix return codes on thread naming failure - Fixes in kni: * Fix crash with null name * Fix build with gcc 8.1 - Fixes in net/thunderx: * Fix build with gcc optimization on * Avoid sq door bell write on zero packet - net/bonding: Fix MAC address reset - vhost: Fix missing increment of log cache count This update was imported from the SUSE:SLE-12-SP3:Update update project.

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 42.3: zypper in -t patch openSUSE-2018-1484=1


Package List

- openSUSE Leap 42.3 (i586 x86_64): dpdk-16.11.8-6.8.1 dpdk-debuginfo-16.11.8-6.8.1 dpdk-debugsource-16.11.8-6.8.1 dpdk-devel-16.11.8-6.8.1 dpdk-devel-debuginfo-16.11.8-6.8.1 dpdk-examples-16.11.8-6.8.1 dpdk-examples-debuginfo-16.11.8-6.8.1 dpdk-tools-16.11.8-6.8.1 - openSUSE Leap 42.3 (x86_64): dpdk-kmp-default-16.11.8_k4.4.162_78-6.8.1 dpdk-kmp-default-debuginfo-16.11.8_k4.4.162_78-6.8.1 - openSUSE Leap 42.3 (noarch): dpdk-doc-16.11.8-6.8.1


References

https://www.suse.com/security/cve/CVE-2018-1059.html https://bugzilla.suse.com/1069601 https://bugzilla.suse.com/1073363 https://bugzilla.suse.com/1089638 https://bugzilla.suse.com/1102310--


Severity
Announcement ID: openSUSE-SU-2018:4003-1
Rating: moderate
Affected Products: openSUSE Leap 42.3 le.

Related News