SB2022111572 - Red Hat Enterprise Linux 9 update for dpdk



SB2022111572 - Red Hat Enterprise Linux 9 update for dpdk

Published: November 15, 2022

Security Bulletin ID SB2022111572
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Adjecent network
Highest impact Code execution

Breakdown by Severity

Medium 67% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Out-of-bounds write (CVE-ID: CVE-2021-3839)

The vulnerability allows a local user to execute arbitrary code with elevated privileges.

The vulnerability exists due to vhost_user_set_inflight_fd() function does not validate msg->payload.inflight.num_queues. A local user can trigger out-of-bounds write and execute arbitrary code with elevated privileges.


2) Resource management error (CVE-ID: CVE-2022-2132)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources within the copy_desc_to_mbuf() function when processing Vhost header. A remote guest can send a packet with the Vhost header crossing more than two descriptors and force application to allocate all available mbufs, causing a denial of service condition for the other guest running on the hypervisor.


3) Error Handling (CVE-ID: CVE-2022-28199)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect error handling of data within the mlx5 driver. A remote guest can send specially crafted packets to the application and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.