Security
Headlines
HeadlinesLatestCVEs

Headline

Red Hat Security Advisory 2023-0172-01

Red Hat Security Advisory 2023-0172-01 - The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space. Issues addressed include a denial of service vulnerability.

Packet Storm
#vulnerability#linux#red_hat#dos#js

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: dpdk security update
Advisory ID: RHSA-2023:0172-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2023:0172
Issue date: 2023-01-16
CVE Names: CVE-2022-2132
=====================================================================

  1. Summary:

An update for dpdk is now available for Red Hat Enterprise Linux 9.0
Extended Update Support.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream EUS (v.9.0) - aarch64, noarch, ppc64le, x86_64

  1. Description:

The dpdk packages provide the Data Plane Development Kit, which is a set of
libraries and drivers for fast packet processing in the user space.

Security Fix(es):

  • dpdk: DoS when a Vhost header crosses more than two descriptors and
    exhausts all mbufs (CVE-2022-2132)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

  1. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

2099475 - CVE-2022-2132 dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs

  1. Package List:

Red Hat Enterprise Linux AppStream EUS (v.9.0):

Source:
dpdk-21.11-2.el9_0.src.rpm

aarch64:
dpdk-21.11-2.el9_0.aarch64.rpm
dpdk-debuginfo-21.11-2.el9_0.aarch64.rpm
dpdk-debugsource-21.11-2.el9_0.aarch64.rpm
dpdk-devel-21.11-2.el9_0.aarch64.rpm
dpdk-tools-21.11-2.el9_0.aarch64.rpm

noarch:
dpdk-doc-21.11-2.el9_0.noarch.rpm

ppc64le:
dpdk-21.11-2.el9_0.ppc64le.rpm
dpdk-debuginfo-21.11-2.el9_0.ppc64le.rpm
dpdk-debugsource-21.11-2.el9_0.ppc64le.rpm
dpdk-devel-21.11-2.el9_0.ppc64le.rpm
dpdk-tools-21.11-2.el9_0.ppc64le.rpm

x86_64:
dpdk-21.11-2.el9_0.x86_64.rpm
dpdk-debuginfo-21.11-2.el9_0.x86_64.rpm
dpdk-debugsource-21.11-2.el9_0.x86_64.rpm
dpdk-devel-21.11-2.el9_0.x86_64.rpm
dpdk-tools-21.11-2.el9_0.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2022-2132
https://access.redhat.com/security/updates/classification/#important

  1. Contact:

The Red Hat security contact is [email protected]. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=nIkf
-----END PGP SIGNATURE-----

RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

Related news

Red Hat Security Advisory 2023-0168-01

Red Hat Security Advisory 2023-0168-01 - The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-0170-01

Red Hat Security Advisory 2023-0170-01 - The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space. Issues addressed include a denial of service vulnerability.

RHSA-2022:6850: Red Hat Security Advisory: openvswitch2.11 security update

An update for openvswitch2.11 is now available for Fast Datapath for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2132: dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs

Ubuntu Security Notice USN-5608-1

Ubuntu Security Notice 5608-1 - It was discovered that DPDK incorrectly handled certain Vhost headers. A remote attacker could possibly use this issue to cause a denial of service.

Red Hat Security Advisory 2022-6384-01

Red Hat Security Advisory 2022-6384-01 - Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6385-01

Red Hat Security Advisory 2022-6385-01 - Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Issues addressed include a denial of service vulnerability.

RHSA-2022:6384: Red Hat Security Advisory: openvswitch2.13 security update

An update for openvswitch2.13 is now available for Fast Datapath for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2132: dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs

RHSA-2022:6386: Red Hat Security Advisory: openvswitch2.17 security update

An update for openvswitch2.17 is now available for Fast Datapath for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2132: dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs

RHSA-2022:6382: Red Hat Security Advisory: openvswitch2.16 security update

An update for openvswitch2.16 is now available for Fast Datapath for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2132: dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs

CVE-2022-2132: Invalid Bug ID

A permissive list of allowed inputs flaw was found in DPDK. This issue allows a remote attacker to cause a denial of service triggered by sending a crafted Vhost header to DPDK.

Packet Storm: Latest News

Backdoor.Win32.Benju.a MVID-2024-0700 Remote Command Execution