First published: Thu Jan 09 2025(Updated: )
Important: dpdk security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/dpdk | <21.11-4.el8_8 | 21.11-4.el8_8 |
redhat/dpdk | <21.11-4.el8_8 | 21.11-4.el8_8 |
redhat/dpdk-debuginfo | <21.11-4.el8_8 | 21.11-4.el8_8 |
redhat/dpdk-debugsource | <21.11-4.el8_8 | 21.11-4.el8_8 |
redhat/dpdk-devel | <21.11-4.el8_8 | 21.11-4.el8_8 |
redhat/dpdk-doc | <21.11-4.el8_8 | 21.11-4.el8_8 |
redhat/dpdk-tools | <21.11-4.el8_8 | 21.11-4.el8_8 |
redhat/dpdk | <21.11-4.el8_8 | 21.11-4.el8_8 |
redhat/dpdk-debuginfo | <21.11-4.el8_8 | 21.11-4.el8_8 |
redhat/dpdk-debugsource | <21.11-4.el8_8 | 21.11-4.el8_8 |
redhat/dpdk-devel | <21.11-4.el8_8 | 21.11-4.el8_8 |
redhat/dpdk-tools | <21.11-4.el8_8 | 21.11-4.el8_8 |
redhat/dpdk | <21.11-4.el8_8.aa | 21.11-4.el8_8.aa |
redhat/dpdk-debuginfo | <21.11-4.el8_8.aa | 21.11-4.el8_8.aa |
redhat/dpdk-debugsource | <21.11-4.el8_8.aa | 21.11-4.el8_8.aa |
redhat/dpdk-devel | <21.11-4.el8_8.aa | 21.11-4.el8_8.aa |
redhat/dpdk-tools | <21.11-4.el8_8.aa | 21.11-4.el8_8.aa |
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux for ARM64 EUS | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux for x86_64 - Extended Update Support |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:0220 is categorized as important.
You can fix RHSA-2025:0220 by updating to the dpdk package version 21.11-4.el8_8.
RHSA-2025:0220 affects various Red Hat Enterprise Linux products including versions for x86_64, Power LE, and ARM architectures.
RHSA-2025:0220 addresses a Denial of Service vulnerability caused by malicious guests on hypervisors using DPDK Vhost.
It is recommended that virtual environments using DPDK Vhost apply the security update to prevent potential Denial of Service attacks.