openSUSE Security Update: Security update for dpdk-thunderxdpdk ______________________________________________________________________________ Announcement ID: openSUSE-SU-2018:1560-1 Rating: moderate References: #1089638 Cross-References: CVE-2018-1059 Affected Products: openSUSE Leap 42.3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update fixes the following issues: - CVE-2018-1059: The DPDK vhost-user interface did not check to verify that all the requested guest physical range was mapped and contiguous when performing Guest Physical Addresses to Host Virtual Addresses translations. This may have lead to a malicious guest exposing vhost-user backend process memory (bsc#1089638). This update was imported from the SUSE:SLE-12-SP3:Update update project. Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 42.3: zypper in -t patch openSUSE-2018-558=1 Package List: - openSUSE Leap 42.3 (i586 x86_64): dpdk-16.11.6-6.5.1 dpdk-debuginfo-16.11.6-6.5.1 dpdk-debugsource-16.11.6-6.5.1 dpdk-devel-16.11.6-6.5.1 dpdk-devel-debuginfo-16.11.6-6.5.1 dpdk-examples-16.11.6-6.5.1 dpdk-examples-debuginfo-16.11.6-6.5.1 dpdk-tools-16.11.6-6.5.1 - openSUSE Leap 42.3 (x86_64): dpdk-kmp-default-16.11.6_k4.4.132_53-6.5.1 dpdk-kmp-default-debuginfo-16.11.6_k4.4.132_53-6.5.1 - openSUSE Leap 42.3 (noarch): dpdk-doc-16.11.6-6.5.1 References: https://www.suse.com/security/cve/CVE-2018-1059.html https://bugzilla.suse.com/1089638 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org