You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa dpdk

Sigurnosni nedostatak programskog paketa dpdk

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-4189-1
November 13, 2019

dpdk vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 19.10
– Ubuntu 19.04
– Ubuntu 18.04 LTS

Summary:

DPDK could be made to consume resources if it received specially crafted
input.

Software Description:
– dpdk: set of libraries for fast packet processing

Details:

Jason Wang discovered that DPDK incorrectly handled certain messages. An
attacker in a malicious container could possibly use this issue to cause
DPDK to leak resources, resulting in a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.10:
dpdk 18.11.4-1ubuntu0.19.10.1

Ubuntu 19.04:
dpdk 18.11.4-1ubuntu0.19.04.1

Ubuntu 18.04 LTS:
dpdk 17.11.8-0~ubuntu18.04.2

This update uses a new upstream release, which includes additional bug
fixes. In general, a standard system update will make all the necessary
changes.

References:
https://usn.ubuntu.com/4189-1
CVE-2019-14818

Package Information:
https://launchpad.net/ubuntu/+source/dpdk/18.11.4-1ubuntu0.19.10.1
https://launchpad.net/ubuntu/+source/dpdk/18.11.4-1ubuntu0.19.04.1
https://launchpad.net/ubuntu/+source/dpdk/17.11.8-0~ubuntu18.04.2

—–BEGIN PGP SIGNATURE—–
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=DR7G
—–END PGP SIGNATURE—–

AutorZvonimir Bosnjak
Cert idNCERT-REF-2019-11-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Ranjivosti Cisco PI i Cisco EPNM softvera

Otkrivena je kritična ranjivost u REST API-u Cisco Prime Infrastructure (PI) i Cisco Evolved Programmable Network Manager (EPNM) proizvoda. Otkrivena...

Close