openSUSE-SU-2018:4003-1: moderate: Security update for dpdk


openSUSE Security Update: Security update for dpdk
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:4003-1
Rating: moderate
References: #1069601 #1073363 #1089638 #1102310
Cross-References: CVE-2018-1059
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that solves one vulnerability and has three fixes
is now available.

Description:

This update for dpdk to version 16.11.8 provides the following security
fix:

– CVE-2018-1059: restrict untrusted guest to misuse virtio to corrupt host
application (ovs-dpdk) memory which could have lead all VM to lose
connectivity (bsc#1089638)

and following non-security fixes:

– Enable the broadcom chipset family Broadcom NetXtreme II BCM57810
(bsc#1073363)
– Fix a latency problem by using cond_resched rather than
schedule_timeout_interruptible (bsc#1069601)
– Fix a syntax error affecting csh environment configuration (bsc#1102310)
– Fixes in net/bnxt:
* Fix HW Tx checksum offload check
* Fix incorrect IO address handling in Tx
* Fix Rx ring count limitation
* Check access denied for HWRM commands
* Fix RETA size
* Fix close operation
– Fixes in eal/linux:
* Fix an invalid syntax in interrupts
* Fix return codes on thread naming failure
– Fixes in kni:
* Fix crash with null name
* Fix build with gcc 8.1
– Fixes in net/thunderx:
* Fix build with gcc optimization on
* Avoid sq door bell write on zero packet
– net/bonding: Fix MAC address reset
– vhost: Fix missing increment of log cache count

This update was imported from the SUSE:SLE-12-SP3:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-1484=1

Package List:

– openSUSE Leap 42.3 (i586 x86_64):

dpdk-16.11.8-6.8.1
dpdk-debuginfo-16.11.8-6.8.1
dpdk-debugsource-16.11.8-6.8.1
dpdk-devel-16.11.8-6.8.1
dpdk-devel-debuginfo-16.11.8-6.8.1
dpdk-examples-16.11.8-6.8.1
dpdk-examples-debuginfo-16.11.8-6.8.1
dpdk-tools-16.11.8-6.8.1

– openSUSE Leap 42.3 (x86_64):

dpdk-kmp-default-16.11.8_k4.4.162_78-6.8.1
dpdk-kmp-default-debuginfo-16.11.8_k4.4.162_78-6.8.1

– openSUSE Leap 42.3 (noarch):

dpdk-doc-16.11.8-6.8.1

References:

https://www.suse.com/security/cve/CVE-2018-1059.html
https://bugzilla.suse.com/1069601
https://bugzilla.suse.com/1073363
https://bugzilla.suse.com/1089638
https://bugzilla.suse.com/1102310


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org