[RHSA-2022:6382-01] Important: openvswitch2.16 security update

Security announcements for all Red Hat products and services. rhsa-announce at redhat.com
Wed Sep 7 22:28:08 UTC 2022


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: openvswitch2.16 security update
Advisory ID:       RHSA-2022:6382-01
Product:           Fast Datapath
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:6382
Issue date:        2022-09-07
CVE Names:         CVE-2022-2132 
=====================================================================

1. Summary:

An update for openvswitch2.16 is now available for Fast Datapath for Red
Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Fast Datapath for Red Hat Enterprise Linux 8 - aarch64, noarch, ppc64le, s390x, x86_64

3. Description:

Open vSwitch provides standard network bridging functions and support for
the OpenFlow protocol for remote per-flow control of traffic.

Security Fix(es):

* dpdk: DoS when a Vhost header crosses more than two descriptors and
exhausts all mbufs (CVE-2022-2132)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

2099475 - CVE-2022-2132 dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs

6. Package List:

Fast Datapath for Red Hat Enterprise Linux 8:

Source:
openvswitch2.16-2.16.0-89.2.el8fdp.src.rpm

aarch64:
network-scripts-openvswitch2.16-2.16.0-89.2.el8fdp.aarch64.rpm
openvswitch2.16-2.16.0-89.2.el8fdp.aarch64.rpm
openvswitch2.16-debuginfo-2.16.0-89.2.el8fdp.aarch64.rpm
openvswitch2.16-debugsource-2.16.0-89.2.el8fdp.aarch64.rpm
openvswitch2.16-devel-2.16.0-89.2.el8fdp.aarch64.rpm
openvswitch2.16-ipsec-2.16.0-89.2.el8fdp.aarch64.rpm
python3-openvswitch2.16-2.16.0-89.2.el8fdp.aarch64.rpm
python3-openvswitch2.16-debuginfo-2.16.0-89.2.el8fdp.aarch64.rpm

noarch:
openvswitch2.16-test-2.16.0-89.2.el8fdp.noarch.rpm

ppc64le:
network-scripts-openvswitch2.16-2.16.0-89.2.el8fdp.ppc64le.rpm
openvswitch2.16-2.16.0-89.2.el8fdp.ppc64le.rpm
openvswitch2.16-debuginfo-2.16.0-89.2.el8fdp.ppc64le.rpm
openvswitch2.16-debugsource-2.16.0-89.2.el8fdp.ppc64le.rpm
openvswitch2.16-devel-2.16.0-89.2.el8fdp.ppc64le.rpm
openvswitch2.16-ipsec-2.16.0-89.2.el8fdp.ppc64le.rpm
python3-openvswitch2.16-2.16.0-89.2.el8fdp.ppc64le.rpm
python3-openvswitch2.16-debuginfo-2.16.0-89.2.el8fdp.ppc64le.rpm

s390x:
network-scripts-openvswitch2.16-2.16.0-89.2.el8fdp.s390x.rpm
openvswitch2.16-2.16.0-89.2.el8fdp.s390x.rpm
openvswitch2.16-debuginfo-2.16.0-89.2.el8fdp.s390x.rpm
openvswitch2.16-debugsource-2.16.0-89.2.el8fdp.s390x.rpm
openvswitch2.16-devel-2.16.0-89.2.el8fdp.s390x.rpm
openvswitch2.16-ipsec-2.16.0-89.2.el8fdp.s390x.rpm
python3-openvswitch2.16-2.16.0-89.2.el8fdp.s390x.rpm
python3-openvswitch2.16-debuginfo-2.16.0-89.2.el8fdp.s390x.rpm

x86_64:
network-scripts-openvswitch2.16-2.16.0-89.2.el8fdp.x86_64.rpm
openvswitch2.16-2.16.0-89.2.el8fdp.x86_64.rpm
openvswitch2.16-debuginfo-2.16.0-89.2.el8fdp.x86_64.rpm
openvswitch2.16-debugsource-2.16.0-89.2.el8fdp.x86_64.rpm
openvswitch2.16-devel-2.16.0-89.2.el8fdp.x86_64.rpm
openvswitch2.16-ipsec-2.16.0-89.2.el8fdp.x86_64.rpm
python3-openvswitch2.16-2.16.0-89.2.el8fdp.x86_64.rpm
python3-openvswitch2.16-debuginfo-2.16.0-89.2.el8fdp.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2022-2132
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert at redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=KfE9
-----END PGP SIGNATURE-----


More information about the RHSA-announce mailing list