<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for dpdk</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:4003-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-12-06T14:31:22Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-12-06T14:31:22Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-12-06T14:31:22Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for dpdk</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
  
This update for dpdk to version 16.11.8 provides the following security fix:

- CVE-2018-1059: restrict untrusted guest to misuse virtio to corrupt host application (ovs-dpdk) memory which could have lead all VM to lose connectivity (bsc#1089638)

and following non-security fixes:

- Enable the broadcom chipset family Broadcom NetXtreme II BCM57810 (bsc#1073363)
- Fix a latency problem by using cond_resched rather than schedule_timeout_interruptible (bsc#1069601)
- Fix a syntax error affecting csh environment configuration (bsc#1102310)
- Fixes in net/bnxt:
    * Fix HW Tx checksum offload check
    * Fix incorrect IO address handling in Tx
    * Fix Rx ring count limitation
    * Check access denied for HWRM commands
    * Fix RETA size
    * Fix close operation
- Fixes in eal/linux:
    * Fix an invalid syntax in interrupts
    * Fix return codes on thread naming failure
- Fixes in kni:
    * Fix crash with null name
    * Fix build with gcc 8.1
- Fixes in net/thunderx:
    * Fix build with gcc optimization on
    * Avoid sq door bell write on zero packet
- net/bonding: Fix MAC address reset
- vhost: Fix missing increment of log cache count

This update was imported from the SUSE:SLE-12-SP3:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00003.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:4003-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="dpdk-16.11.8-6.8.1">
      <FullProductName ProductID="dpdk-16.11.8-6.8.1">dpdk-16.11.8-6.8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dpdk-devel-16.11.8-6.8.1">
      <FullProductName ProductID="dpdk-devel-16.11.8-6.8.1">dpdk-devel-16.11.8-6.8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dpdk-doc-16.11.8-6.8.1">
      <FullProductName ProductID="dpdk-doc-16.11.8-6.8.1">dpdk-doc-16.11.8-6.8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dpdk-examples-16.11.8-6.8.1">
      <FullProductName ProductID="dpdk-examples-16.11.8-6.8.1">dpdk-examples-16.11.8-6.8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dpdk-kmp-default-16.11.8_k4.4.162_78-6.8.1">
      <FullProductName ProductID="dpdk-kmp-default-16.11.8_k4.4.162_78-6.8.1">dpdk-kmp-default-16.11.8_k4.4.162_78-6.8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dpdk-tools-16.11.8-6.8.1">
      <FullProductName ProductID="dpdk-tools-16.11.8-6.8.1">dpdk-tools-16.11.8-6.8.1</FullProductName>
    </Branch>
    <Relationship ProductReference="dpdk-16.11.8-6.8.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:dpdk-16.11.8-6.8.1">dpdk-16.11.8-6.8.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="dpdk-devel-16.11.8-6.8.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:dpdk-devel-16.11.8-6.8.1">dpdk-devel-16.11.8-6.8.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="dpdk-doc-16.11.8-6.8.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:dpdk-doc-16.11.8-6.8.1">dpdk-doc-16.11.8-6.8.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="dpdk-examples-16.11.8-6.8.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:dpdk-examples-16.11.8-6.8.1">dpdk-examples-16.11.8-6.8.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="dpdk-kmp-default-16.11.8_k4.4.162_78-6.8.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:dpdk-kmp-default-16.11.8_k4.4.162_78-6.8.1">dpdk-kmp-default-16.11.8_k4.4.162_78-6.8.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="dpdk-tools-16.11.8-6.8.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:dpdk-tools-16.11.8-6.8.1">dpdk-tools-16.11.8-6.8.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DPDK vhost-user interface does not check to verify that all the requested guest physical range is mapped and contiguous when performing Guest Physical Addresses to Host Virtual Addresses translations. This may lead to a malicious guest exposing vhost-user backend process memory. All versions before 18.02.1 are vulnerable.</Note>
    </Notes>
    <CVE>CVE-2018-1059</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:dpdk-16.11.8-6.8.1</ProductID>
        <ProductID>openSUSE Leap 42.3:dpdk-devel-16.11.8-6.8.1</ProductID>
        <ProductID>openSUSE Leap 42.3:dpdk-doc-16.11.8-6.8.1</ProductID>
        <ProductID>openSUSE Leap 42.3:dpdk-examples-16.11.8-6.8.1</ProductID>
        <ProductID>openSUSE Leap 42.3:dpdk-kmp-default-16.11.8_k4.4.162_78-6.8.1</ProductID>
        <ProductID>openSUSE Leap 42.3:dpdk-tools-16.11.8-6.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1059.html</URL>
        <Description>CVE-2018-1059</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089638</URL>
        <Description>SUSE Bug 1089638</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090647</URL>
        <Description>SUSE Bug 1090647</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
