First published: Mon Jan 16 2023(Updated: )
The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space.<br>Security Fix(es):<br><li> dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs (CVE-2022-2132)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/dpdk | <20.11-4.el8_4 | 20.11-4.el8_4 |
redhat/dpdk | <20.11-4.el8_4 | 20.11-4.el8_4 |
redhat/dpdk-debuginfo | <20.11-4.el8_4 | 20.11-4.el8_4 |
redhat/dpdk-debugsource | <20.11-4.el8_4 | 20.11-4.el8_4 |
redhat/dpdk-devel | <20.11-4.el8_4 | 20.11-4.el8_4 |
redhat/dpdk-doc | <20.11-4.el8_4 | 20.11-4.el8_4 |
redhat/dpdk-tools | <20.11-4.el8_4 | 20.11-4.el8_4 |
redhat/dpdk | <20.11-4.el8_4 | 20.11-4.el8_4 |
redhat/dpdk-debuginfo | <20.11-4.el8_4 | 20.11-4.el8_4 |
redhat/dpdk-debugsource | <20.11-4.el8_4 | 20.11-4.el8_4 |
redhat/dpdk-devel | <20.11-4.el8_4 | 20.11-4.el8_4 |
redhat/dpdk-tools | <20.11-4.el8_4 | 20.11-4.el8_4 |
redhat/dpdk | <20.11-4.el8_4.aa | 20.11-4.el8_4.aa |
redhat/dpdk-debuginfo | <20.11-4.el8_4.aa | 20.11-4.el8_4.aa |
redhat/dpdk-debugsource | <20.11-4.el8_4.aa | 20.11-4.el8_4.aa |
redhat/dpdk-devel | <20.11-4.el8_4.aa | 20.11-4.el8_4.aa |
redhat/dpdk-tools | <20.11-4.el8_4.aa | 20.11-4.el8_4.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:0169 is classified as important.
To fix RHSA-2023:0169, you need to update the dpdk packages to version 20.11-4.el8_4.
RHSA-2023:0169 addresses a denial of service (DoS) vulnerability when a Vhost header crosses more than two descriptors.
RHSA-2023:0169 affects various dpdk packages including dpdk, dpdk-debuginfo, dpdk-devel, and others.
Yes, RHSA-2023:0169 is associated with CVE-2022-2132.