English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 143769 CVE descriptions
and 71225 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.852159
Category:SuSE Local Security Checks
Title:SuSE Update for dpdk openSUSE-SU-2018:4003-1 (dpdk)
Summary:The remote host is missing an update for the 'dpdk'; package(s) announced via the openSUSE-SU-2018:4003_1 advisory.
Description:Summary:
The remote host is missing an update for the 'dpdk'
package(s) announced via the openSUSE-SU-2018:4003_1 advisory.

Vulnerability Insight:
This update for dpdk to version 16.11.8
provides the following security fix:

- CVE-2018-1059: restrict untrusted guest to misuse virtio to corrupt host
application (ovs-dpdk) memory which could have lead all VM to lose
connectivity (bsc#1089638)

and following non-security fixes:

- Enable the broadcom chipset family Broadcom NetXtreme II BCM57810
(bsc#1073363)

- Fix a latency problem by using cond_resched rather than
schedule_timeout_interruptible (bsc#1069601)

- Fix a syntax error affecting csh environment configuration (bsc#1102310)

- Fixes in net/bnxt:

* Fix HW Tx checksum offload check

* Fix incorrect IO address handling in Tx

* Fix Rx ring count limitation

* Check access denied for HWRM commands

* Fix RETA size

* Fix close operation

- Fixes in eal/linux:

* Fix an invalid syntax in interrupts

* Fix return codes on thread naming failure

- Fixes in kni:

* Fix crash with null name

* Fix build with gcc 8.1

- Fixes in net/thunderx:

* Fix build with gcc optimization on

* Avoid sq door bell write on zero packet

- net/bonding: Fix MAC address reset

- vhost: Fix missing increment of log cache count

This update was imported from the SUSE:SLE-12-SP3:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended
installation methods
like YaST online_update or 'zypper patch'.

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-1484=1

Affected Software/OS:
dpdk on openSUSE Leap 42.3.

Solution:
Please install the updated package(s).

CVSS Score:
2.9

CVSS Vector:
AV:A/AC:M/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-1059
https://access.redhat.com/security/cve/cve-2018-1059
RedHat Security Advisories: RHSA-2018:1267
https://access.redhat.com/errata/RHSA-2018:1267
RedHat Security Advisories: RHSA-2018:2038
https://access.redhat.com/errata/RHSA-2018:2038
RedHat Security Advisories: RHSA-2018:2102
https://access.redhat.com/errata/RHSA-2018:2102
RedHat Security Advisories: RHSA-2018:2524
https://access.redhat.com/errata/RHSA-2018:2524
https://usn.ubuntu.com/3642-1/
https://usn.ubuntu.com/3642-2/
CopyrightCopyright (C) 2018 Greenbone Networks GmbH

This is only one of 71225 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.