Bug 2099475 (CVE-2022-2132)
Summary: | CVE-2022-2132 dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | TEJ RATHI <trathi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | aconole, amctagga, aoconnor, arachman, bmontgom, bniver, ctrautma, echaudro, eglynn, eparis, fleitner, flucifre, gmeno, jburrell, jhsiao, jjoyce, jokerman, ktraynor, kzhang, lhh, linville, lveyde, maxime.coquelin, mbenjamin, mburns, mgarciac, mhackett, michal.skrivanek, mperina, nhorman, nstielau, ntait, ovs-qe, ovs-team, ralongi, rhos-maint, rkhan, security-response-team, sostapov, sponnaga, spower, tredaelli, vereddy, vkumar |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | dpdk 21.11, dpdk 20.11, dpdk 19.11 | Doc Type: | If docs needed, set a value |
Doc Text: |
A permissive list of allowed inputs flaw was found in DPDK. This issue allows a remote attacker to cause a denial of service triggered by sending a crafted Vhost header to DPDK.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-12-05 21:33:23 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2102403, 2102404, 2102405, 2102406, 2102407, 2102408, 2102409, 2102410, 2102411, 2102412, 2102413, 2102414, 2102415, 2102416, 2102417, 2102418, 2102419, 2102420, 2104285, 2104288, 2104289, 2104290, 2104291, 2104292, 2104293, 2104294, 2104295, 2107165, 2107166, 2107167, 2107169, 2107170, 2107171, 2107172, 2107173, 2122335, 2126287, 2155508 | ||
Bug Blocks: | 2099290, 2122510 |
Description
TEJ RATHI
2022-06-21 05:16:43 UTC
Created dpdk tracking bugs for this issue: Affects: fedora-all [bug 2122335] Ran the following sanity tests to verify: Selinux/netperf(ovs-dpfk-tunneling): https://beaker.engineering.redhat.com/jobs/6962774 RFC2544 PvP over ovs-dpdk/XXv710: 25.5 Mpps Below is the link to all vhostuser tests: https://docs.google.com/spreadsheets/d/1EUbENq1LQsaUTcQLTQZCmmIrDvYMeDXgl1vEqjoF5kM/edit?usp=sharing This issue has been addressed in the following products: Fast Datapath for Red Hat Enterprise Linux 9 Via RHSA-2022:6386 https://access.redhat.com/errata/RHSA-2022:6386 This issue has been addressed in the following products: Fast Datapath for Red Hat Enterprise Linux 8 Via RHSA-2022:6385 https://access.redhat.com/errata/RHSA-2022:6385 This issue has been addressed in the following products: Fast Datapath for Red Hat Enterprise Linux 8 Via RHSA-2022:6384 https://access.redhat.com/errata/RHSA-2022:6384 This issue has been addressed in the following products: Fast Datapath for Red Hat Enterprise Linux 8 Via RHSA-2022:6383 https://access.redhat.com/errata/RHSA-2022:6383 This issue has been addressed in the following products: Fast Datapath for Red Hat Enterprise Linux 8 Via RHSA-2022:6382 https://access.redhat.com/errata/RHSA-2022:6382 This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 8 Via RHSA-2022:6551 https://access.redhat.com/errata/RHSA-2022:6551 This issue has been addressed in the following products: Fast Datapath for Red Hat Enterprise Linux 7 Via RHSA-2022:6850 https://access.redhat.com/errata/RHSA-2022:6850 This issue has been addressed in the following products: Red Hat OpenStack Platform 13.0 - ELS Via RHSA-2022:7268 https://access.redhat.com/errata/RHSA-2022:7268 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:8263 https://access.redhat.com/errata/RHSA-2022:8263 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-2132 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Extras Via RHSA-2023:0167 https://access.redhat.com/errata/RHSA-2023:0167 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2023:0168 https://access.redhat.com/errata/RHSA-2023:0168 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions Red Hat Enterprise Linux 8.2 Telecommunications Update Service Via RHSA-2023:0166 https://access.redhat.com/errata/RHSA-2023:0166 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:0172 https://access.redhat.com/errata/RHSA-2023:0172 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2023:0169 https://access.redhat.com/errata/RHSA-2023:0169 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:0170 https://access.redhat.com/errata/RHSA-2023:0170 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:0171 https://access.redhat.com/errata/RHSA-2023:0171 |