First published: Thu Apr 17 2025(Updated: )
Important: openvswitch3.1 security update
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux Fast Datapath | ||
Red Hat Enterprise Linux Fast Datapath | ||
Red Hat Enterprise Linux Fast Datapath | ||
Red Hat Enterprise Linux Fast Datapath | ||
redhat/openvswitch3.1 | <3.1.0-159.el8fd | 3.1.0-159.el8fd |
redhat/network-scripts-openvswitch3.1 | <3.1.0-159.el8fd | 3.1.0-159.el8fd |
redhat/openvswitch3.1-debuginfo | <3.1.0-159.el8fd | 3.1.0-159.el8fd |
redhat/openvswitch3.1-debugsource | <3.1.0-159.el8fd | 3.1.0-159.el8fd |
redhat/openvswitch3.1-devel | <3.1.0-159.el8fd | 3.1.0-159.el8fd |
redhat/openvswitch3.1-ipsec | <3.1.0-159.el8fd | 3.1.0-159.el8fd |
redhat/openvswitch3.1-test | <3.1.0-159.el8fd | 3.1.0-159.el8fd |
redhat/python3-openvswitch3.1 | <3.1.0-159.el8fd | 3.1.0-159.el8fd |
redhat/python3-openvswitch3.1-debuginfo | <3.1.0-159.el8fd | 3.1.0-159.el8fd |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:3970 is classified as Important.
To fix RHSA-2025:3970, update the affected openvswitch3.1 packages to version 3.1.0-159.el8fd.
RHSA-2025:3970 affects multiple Red Hat Enterprise Linux Fast Datapath products for different architectures.
RHSA-2025:3970 reports a Denial Of Service vulnerability that can be triggered by a malicious guest on hypervisors using DPDK Vhost.
Yes, the vulnerability specifically affects the DPDK Vhost component as part of the openvswitch3.1 functionality.