UbuntuUpdates.org

Package "dpdk-dev"

Name: dpdk-dev

Description:

Data Plane Development Kit (dev tools)

Latest version: 19.11.14-0ubuntu0.20.04.1
Release: focal (20.04)
Level: updates
Repository: universe
Head package: dpdk
Homepage: https://www.dpdk.org

Links


Download "dpdk-dev"


Other versions of "dpdk-dev" in Focal

Repository Area Version
base universe 19.11.1-0ubuntu1
security universe 19.11.13-0ubuntu0.20.04.1

Changelog

Version: 19.11.7-0ubuntu0.20.04.1 2021-04-06 23:07:10 UTC

  dpdk (19.11.7-0ubuntu0.20.04.1) focal; urgency=medium

  * Merge the latest upstream stable minor release 19.11.7-rc1
    19.11.7 at https://doc.dpdk.org/guides-19.11/rel_notes/release_19_11.html
  * fix linking back to pre be like 19.11.6 behavior (LP: #1920141)

 -- Christian Ehrhardt <email address hidden> Tue, 23 Feb 2021 11:03:38 +0100

Source diff to previous version
1920141 [SRU] openvswitch 2.13.3 / linking changes in DPDK 19.11.x

Version: 19.11.6-0ubuntu0.20.04.1 2021-02-15 14:06:23 UTC

  dpdk (19.11.6-0ubuntu0.20.04.1) focal; urgency=medium

  * Merge latest upstream stable minor release 19.11.6 (LP: #1912464)
    For a detailed list of changes check out:
    19.11.4 https://doc.dpdk.org/guides-19.11/rel_notes/release_19_11.html#id7
    19.11.5 https://doc.dpdk.org/guides-19.11/rel_notes/release_19_11.html#id11
    19.11.6 https://doc.dpdk.org/guides-19.11/rel_notes/release_19_11.html#id14
    - update d/p/revert-net-ipn3ke-fix-meson-build.patch: to match 19.11.6
    - drop debian/patches/CVE-2020-1437x/*.patch being part of 19.11.5
    - drop d/p/19.11-remove-zero-copy-and-client-mode-restriction.patch being
      part of 19.11.5
    - Add "Adjust dpdk-doc install path for guides" from 19.11.4-1 as it is
      needed for the newer upstream version

 -- Christian Ehrhardt <email address hidden> Wed, 20 Jan 2021 09:43:42 +0100

Source diff to previous version
1912464 Minor release upgrade - 19.11.6
CVE-2020-1437 An elevation of privilege vulnerability exists in the way that the Windows Network Location Awareness Service handles objects in memory, aka 'Windows

Version: 19.11.3-0ubuntu0.2 2020-09-28 19:06:25 UTC

  dpdk (19.11.3-0ubuntu0.2) focal-security; urgency=medium

  * SECURITY UPDATE: Multiple security issues
    - debian/patches/CVE-2020-1437x/*.patch: added upstream patches to fix
      the issues.
    - CVE-2020-14374
    - CVE-2020-14375
    - CVE-2020-14376
    - CVE-2020-14377
    - CVE-2020-14378

 -- Marc Deslauriers <email address hidden> Thu, 17 Sep 2020 08:29:30 -0400

Source diff to previous version
CVE-2020-1437 An elevation of privilege vulnerability exists in the way that the Windows Network Location Awareness Service handles objects in memory, aka 'Windows
CVE-2020-14374 RESERVED
CVE-2020-14375 RESERVED
CVE-2020-14376 RESERVED
CVE-2020-14377 RESERVED
CVE-2020-14378 RESERVED

Version: 19.11.3-0ubuntu0.1 2020-08-10 15:06:36 UTC

  dpdk (19.11.3-0ubuntu0.1) focal; urgency=medium

  * Merge latest stable DPDK release 19.11.3; for a full list of changes see:
    https://doc.dpdk.org/guides-19.11/rel_notes/release_19_11.html#release-notes
    (LP: #1885915)
  * Remaining Changes:
    - d/control: disable libbpf-dev build dependency while waiting for the
      kernel to build it for LP: 1836708 1826410.
    - d/control: remove librte-pmd-af-xdp20.0 until libbpf-dev is available
    - d/p/revert-net-ipn3ke-fix-meson-build.patch: avoid adding new shared
      objects and binary packages
    - Revert "add new packages which didn't build"
  * Dropped changes
    - drop security patches being included in 19.11.3
      - d/p/0001-vhost-check-log-mmap-offset-and-size-overflow.patch
      - d/p/0002-vhost-fix-vring-index-check.patch
      - d/p/0003-vhost-crypto-validate-keys-lengths.patch
      - d/p/0004-vhost-fix-translated-address-not-checked.patch
      - d/p/0005-vhost-fix-potential-memory-space-leak.patch
      - d/p/0006-vhost-fix-potential-fd-leak.patch
  * Added changes:
    - d/p/19.11-remove-zero-copy-and-client-mode-restriction.patch: avoid
      dropping a used feature with the stable update

 -- Christian Ehrhardt <email address hidden> Thu, 02 Jul 2020 08:41:28 +0200

Source diff to previous version
1885915 merge latest DPDK LTS versions into Ubuntu LTS's

Version: 19.11.1-0ubuntu1.1 2020-05-18 17:06:58 UTC

  dpdk (19.11.1-0ubuntu1.1) focal-security; urgency=medium

  * SECURITY UPDATE: Integer overflow in vhost_user_set_log_base()
    - d/p/0001-vhost-check-log-mmap-offset-and-size-overflow.patch: check
      log mmap offset and size overflow in lib/librte_vhost/vhost_user.c.
    - CVE-2020-10722
  * SECURITY UPDATE: Int truncation in vhost_user_check_and_alloc_queue_pair()
    - d/p/0002-vhost-fix-vring-index-check.patch: fix vring index check in
      lib/librte_vhost/vhost_user.c.
    - CVE-2020-10723
  * SECURITY UPDATE: Missing inputs validation in Vhost-crypto
    - d/p/0003-vhost-crypto-validate-keys-lengths.patch: validate keys
      lengths in lib/librte_vhost/vhost_crypto.c.
    - CVE-2020-10724
  * SECURITY UPDATE: Malicious guest could cause segfault by sending
    invalid Virtio descriptor
    - d/p/0004-vhost-fix-translated-address-not-checked.patch: fix
      translated address not checked in lib/librte_vhost/virtio_net.c.
    - CVE-2020-10725
  * SECURITY UPDATE: VHOST_USER_GET_INFLIGHT_FD message flooding to result
    in a DOS
    - d/p/0005-vhost-fix-potential-memory-space-leak.patch: fix potential
      memory space leak in lib/librte_vhost/vhost_user.c.
    - d/p/0006-vhost-fix-potential-fd-leak.patch: fix potential fd leak in
      lib/librte_vhost/vhost_user.c.
    - CVE-2020-10726

 -- Marc Deslauriers <email address hidden> Tue, 12 May 2020 07:34:18 -0400

CVE-2020-10722 RESERVED
CVE-2020-10723 RESERVED
CVE-2020-10724 RESERVED
CVE-2020-10725 RESERVED
CVE-2020-10726 RESERVED



About   -   Send Feedback to @ubuntu_updates