First published: Thu Oct 06 2022(Updated: )
Open vSwitch provides standard network bridging functions and support for<br>the OpenFlow protocol for remote per-flow control of traffic.<br>Security Fix(es):<br><li> dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs (CVE-2022-2132)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openvswitch2.11 | <2.11.3-96.2.el7fd | 2.11.3-96.2.el7fd |
redhat/openvswitch2.11-debuginfo | <2.11.3-96.2.el7fd | 2.11.3-96.2.el7fd |
redhat/openvswitch2.11-devel | <2.11.3-96.2.el7fd | 2.11.3-96.2.el7fd |
redhat/openvswitch2.11-test | <2.11.3-96.2.el7fd | 2.11.3-96.2.el7fd |
redhat/python-openvswitch2.11 | <2.11.3-96.2.el7fd | 2.11.3-96.2.el7fd |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:6850 is rated as important.
To fix RHSA-2022:6850, you should update the Open vSwitch packages to version 2.11.3-96.2.el7fd.
RHSA-2022:6850 addresses a denial-of-service vulnerability caused by a Vhost header crossing multiple descriptors (CVE-2022-2132).
The affected software packages include openvswitch2.11, openvswitch2.11-debuginfo, openvswitch2.11-devel, openvswitch2.11-test, and python-openvswitch2.11.
No, a reboot is not required after applying the fix for RHSA-2022:6850.