SUSE: 2022:2880-1 important: dpdk | LinuxSecurity.com

Advisories


   SUSE Security Update: Security update for dpdk
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:2880-1
Rating:             important
References:         #1195172 #1198581 #1198873 
Affected Products:
                    SUSE Linux Enterprise High Performance Computing 15-SP4
                    SUSE Linux Enterprise Module for Server Applications 15-SP4
                    SUSE Linux Enterprise Server 15-SP4
                    SUSE Linux Enterprise Server for SAP Applications 15-SP4
                    SUSE Manager Proxy 4.3
                    SUSE Manager Retail Branch Server 4.3
                    SUSE Manager Server 4.3
                    openSUSE Leap 15.4
______________________________________________________________________________

   An update that contains security fixes can now be installed.

Description:

    This update of dpdk fixes the following issue:

   - Fix to read PCI device name as UTF strings (bsc#1198873)
   - Allow configuring thread granularity of Kernel NIC Interface
     (bsc#1195172)
   - Rebuild with new secure boot key due to grub2 boothole 3 issues
     (bsc#1198581)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.4:

      zypper in -t patch openSUSE-SLE-15.4-2022-2880=1

   - SUSE Linux Enterprise Module for Server Applications 15-SP4:

      zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2022-2880=1



Package List:

   - openSUSE Leap 15.4 (aarch64 ppc64le x86_64):

      dpdk-19.11.10-150400.4.4.1
      dpdk-debuginfo-19.11.10-150400.4.4.1
      dpdk-debugsource-19.11.10-150400.4.4.1
      dpdk-devel-19.11.10-150400.4.4.1
      dpdk-devel-debuginfo-19.11.10-150400.4.4.1
      dpdk-examples-19.11.10-150400.4.4.1
      dpdk-examples-debuginfo-19.11.10-150400.4.4.1
      dpdk-kmp-default-19.11.10_k5.14.21_150400.24.11-150400.4.4.1
      dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.11-150400.4.4.1
      dpdk-tools-19.11.10-150400.4.4.1
      dpdk-tools-debuginfo-19.11.10-150400.4.4.1
      libdpdk-20_0-19.11.10-150400.4.4.1
      libdpdk-20_0-debuginfo-19.11.10-150400.4.4.1

   - openSUSE Leap 15.4 (aarch64):

      dpdk-thunderx-19.11.10-150400.4.4.1
      dpdk-thunderx-debuginfo-19.11.10-150400.4.4.1
      dpdk-thunderx-debugsource-19.11.10-150400.4.4.1
      dpdk-thunderx-devel-19.11.10-150400.4.4.1
      dpdk-thunderx-devel-debuginfo-19.11.10-150400.4.4.1
      dpdk-thunderx-examples-19.11.10-150400.4.4.1
      dpdk-thunderx-examples-debuginfo-19.11.10-150400.4.4.1
      dpdk-thunderx-kmp-default-19.11.10_k5.14.21_150400.24.11-150400.4.4.1
      dpdk-thunderx-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.11-150400.4.4.1
      dpdk-thunderx-tools-19.11.10-150400.4.4.1
      dpdk-thunderx-tools-debuginfo-19.11.10-150400.4.4.1

   - openSUSE Leap 15.4 (noarch):

      dpdk-doc-19.11.10-150400.4.4.1
      dpdk-thunderx-doc-19.11.10-150400.4.4.1

   - SUSE Linux Enterprise Module for Server Applications 15-SP4 (aarch64 ppc64le x86_64):

      dpdk-19.11.10-150400.4.4.1
      dpdk-debuginfo-19.11.10-150400.4.4.1
      dpdk-debugsource-19.11.10-150400.4.4.1
      dpdk-devel-19.11.10-150400.4.4.1
      dpdk-devel-debuginfo-19.11.10-150400.4.4.1
      dpdk-kmp-default-19.11.10_k5.14.21_150400.24.11-150400.4.4.1
      dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.11-150400.4.4.1
      dpdk-tools-19.11.10-150400.4.4.1
      dpdk-tools-debuginfo-19.11.10-150400.4.4.1
      libdpdk-20_0-19.11.10-150400.4.4.1
      libdpdk-20_0-debuginfo-19.11.10-150400.4.4.1

   - SUSE Linux Enterprise Module for Server Applications 15-SP4 (aarch64):

      dpdk-thunderx-19.11.10-150400.4.4.1
      dpdk-thunderx-debuginfo-19.11.10-150400.4.4.1
      dpdk-thunderx-debugsource-19.11.10-150400.4.4.1
      dpdk-thunderx-devel-19.11.10-150400.4.4.1
      dpdk-thunderx-devel-debuginfo-19.11.10-150400.4.4.1
      dpdk-thunderx-kmp-default-19.11.10_k5.14.21_150400.24.11-150400.4.4.1
      dpdk-thunderx-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.11-150400.4.4.1


References:

   https://bugzilla.suse.com/1195172
   https://bugzilla.suse.com/1198581
   https://bugzilla.suse.com/1198873

SUSE: 2022:2880-1 important: dpdk

August 23, 2022
An update that contains security fixes can now be installed

Summary

This update of dpdk fixes the following issue: - Fix to read PCI device name as UTF strings (bsc#1198873) - Allow configuring thread granularity of Kernel NIC Interface (bsc#1195172) - Rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.4: zypper in -t patch openSUSE-SLE-15.4-2022-2880=1 - SUSE Linux Enterprise Module for Server Applications 15-SP4: zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2022-2880=1 Package List: - openSUSE Leap 15.4 (aarch64 ppc64le x86_64): dpdk-19.11.10-150400.4.4.1 dpdk-debuginfo-19.11.10-150400.4.4.1 dpdk-debugsource-19.11.10-150400.4.4.1 dpdk-devel-19.11.10-150400.4.4.1 dpdk-devel-debuginfo-19.11.10-150400.4.4.1 dpdk-examples-19.11.10-150400.4.4.1 dpdk-examples-debuginfo-19.11.10-150400.4.4.1 dpdk-kmp-default-19.11.10_k5.14.21_150400.24.11-150400.4.4.1 dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.11-150400.4.4.1 dpdk-tools-19.11.10-150400.4.4.1 dpdk-tools-debuginfo-19.11.10-150400.4.4.1 libdpdk-20_0-19.11.10-150400.4.4.1 libdpdk-20_0-debuginfo-19.11.10-150400.4.4.1 - openSUSE Leap 15.4 (aarch64): dpdk-thunderx-19.11.10-150400.4.4.1 dpdk-thunderx-debuginfo-19.11.10-150400.4.4.1 dpdk-thunderx-debugsource-19.11.10-150400.4.4.1 dpdk-thunderx-devel-19.11.10-150400.4.4.1 dpdk-thunderx-devel-debuginfo-19.11.10-150400.4.4.1 dpdk-thunderx-examples-19.11.10-150400.4.4.1 dpdk-thunderx-examples-debuginfo-19.11.10-150400.4.4.1 dpdk-thunderx-kmp-default-19.11.10_k5.14.21_150400.24.11-150400.4.4.1 dpdk-thunderx-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.11-150400.4.4.1 dpdk-thunderx-tools-19.11.10-150400.4.4.1 dpdk-thunderx-tools-debuginfo-19.11.10-150400.4.4.1 - openSUSE Leap 15.4 (noarch): dpdk-doc-19.11.10-150400.4.4.1 dpdk-thunderx-doc-19.11.10-150400.4.4.1 - SUSE Linux Enterprise Module for Server Applications 15-SP4 (aarch64 ppc64le x86_64): dpdk-19.11.10-150400.4.4.1 dpdk-debuginfo-19.11.10-150400.4.4.1 dpdk-debugsource-19.11.10-150400.4.4.1 dpdk-devel-19.11.10-150400.4.4.1 dpdk-devel-debuginfo-19.11.10-150400.4.4.1 dpdk-kmp-default-19.11.10_k5.14.21_150400.24.11-150400.4.4.1 dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.11-150400.4.4.1 dpdk-tools-19.11.10-150400.4.4.1 dpdk-tools-debuginfo-19.11.10-150400.4.4.1 libdpdk-20_0-19.11.10-150400.4.4.1 libdpdk-20_0-debuginfo-19.11.10-150400.4.4.1 - SUSE Linux Enterprise Module for Server Applications 15-SP4 (aarch64): dpdk-thunderx-19.11.10-150400.4.4.1 dpdk-thunderx-debuginfo-19.11.10-150400.4.4.1 dpdk-thunderx-debugsource-19.11.10-150400.4.4.1 dpdk-thunderx-devel-19.11.10-150400.4.4.1 dpdk-thunderx-devel-debuginfo-19.11.10-150400.4.4.1 dpdk-thunderx-kmp-default-19.11.10_k5.14.21_150400.24.11-150400.4.4.1 dpdk-thunderx-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.11-150400.4.4.1

References

#1195172 #1198581 #1198873

Affected Products:

SUSE Linux Enterprise High Performance Computing 15-SP4

SUSE Linux Enterprise Module for Server Applications 15-SP4

SUSE Linux Enterprise Server 15-SP4

SUSE Linux Enterprise Server for SAP Applications 15-SP4

SUSE Manager Proxy 4.3

SUSE Manager Retail Branch Server 4.3

SUSE Manager Server 4.3

openSUSE Leap 15.4

https://bugzilla.suse.com/1195172

https://bugzilla.suse.com/1198581

https://bugzilla.suse.com/1198873

Severity
Announcement ID: SUSE-SU-2022:2880-1
Rating: important

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.