<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for dpdk-thunderxdpdk</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:1560-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-06-05T21:01:59Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-06-05T21:01:59Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-06-05T21:01:59Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for dpdk-thunderxdpdk</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
  This update fixes the following issues:
  
- CVE-2018-1059: The DPDK vhost-user interface did not check to verify that all the requested guest 
  physical range was mapped and contiguous when performing Guest Physical Addresses to Host Virtual Addresses 
  translations. This may have lead to a malicious guest exposing vhost-user backend process memory (bsc#1089638).
  
This update was imported from the SUSE:SLE-12-SP3:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00005.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:1560-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="dpdk-16.11.6-6.5.1">
      <FullProductName ProductID="dpdk-16.11.6-6.5.1">dpdk-16.11.6-6.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dpdk-devel-16.11.6-6.5.1">
      <FullProductName ProductID="dpdk-devel-16.11.6-6.5.1">dpdk-devel-16.11.6-6.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dpdk-doc-16.11.6-6.5.1">
      <FullProductName ProductID="dpdk-doc-16.11.6-6.5.1">dpdk-doc-16.11.6-6.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dpdk-examples-16.11.6-6.5.1">
      <FullProductName ProductID="dpdk-examples-16.11.6-6.5.1">dpdk-examples-16.11.6-6.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dpdk-kmp-default-16.11.6_k4.4.132_53-6.5.1">
      <FullProductName ProductID="dpdk-kmp-default-16.11.6_k4.4.132_53-6.5.1">dpdk-kmp-default-16.11.6_k4.4.132_53-6.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dpdk-tools-16.11.6-6.5.1">
      <FullProductName ProductID="dpdk-tools-16.11.6-6.5.1">dpdk-tools-16.11.6-6.5.1</FullProductName>
    </Branch>
    <Relationship ProductReference="dpdk-16.11.6-6.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:dpdk-16.11.6-6.5.1">dpdk-16.11.6-6.5.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="dpdk-devel-16.11.6-6.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:dpdk-devel-16.11.6-6.5.1">dpdk-devel-16.11.6-6.5.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="dpdk-doc-16.11.6-6.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:dpdk-doc-16.11.6-6.5.1">dpdk-doc-16.11.6-6.5.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="dpdk-examples-16.11.6-6.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:dpdk-examples-16.11.6-6.5.1">dpdk-examples-16.11.6-6.5.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="dpdk-kmp-default-16.11.6_k4.4.132_53-6.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:dpdk-kmp-default-16.11.6_k4.4.132_53-6.5.1">dpdk-kmp-default-16.11.6_k4.4.132_53-6.5.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="dpdk-tools-16.11.6-6.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:dpdk-tools-16.11.6-6.5.1">dpdk-tools-16.11.6-6.5.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DPDK vhost-user interface does not check to verify that all the requested guest physical range is mapped and contiguous when performing Guest Physical Addresses to Host Virtual Addresses translations. This may lead to a malicious guest exposing vhost-user backend process memory. All versions before 18.02.1 are vulnerable.</Note>
    </Notes>
    <CVE>CVE-2018-1059</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:dpdk-16.11.6-6.5.1</ProductID>
        <ProductID>openSUSE Leap 42.3:dpdk-devel-16.11.6-6.5.1</ProductID>
        <ProductID>openSUSE Leap 42.3:dpdk-doc-16.11.6-6.5.1</ProductID>
        <ProductID>openSUSE Leap 42.3:dpdk-examples-16.11.6-6.5.1</ProductID>
        <ProductID>openSUSE Leap 42.3:dpdk-kmp-default-16.11.6_k4.4.132_53-6.5.1</ProductID>
        <ProductID>openSUSE Leap 42.3:dpdk-tools-16.11.6-6.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1059.html</URL>
        <Description>CVE-2018-1059</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089638</URL>
        <Description>SUSE Bug 1089638</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090647</URL>
        <Description>SUSE Bug 1090647</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
