Login
Newsletter
Werbung

Sicherheit: Denial of Service in openvswitch
Aktuelle Meldungen Distributionen
Name: Denial of Service in openvswitch
ID: RHSA-2025:3970
Distribution: Red Hat
Plattformen: Red Hat Fast Datapath for Red Hat Enterprise Linux 8
Datum: Do, 17. April 2025, 07:33
Referenzen: https://bugzilla.redhat.com/show_bug.cgi?id=2327955
https://access.redhat.com/errata/RHSA-2025:3970
https://access.redhat.com/security/cve/CVE-2024-11614
https://issues.redhat.com/browse/FDP-1199
https://issues.redhat.com/browse/FDP-1169
https://issues.redhat.com/browse/FDP-1162
Applikationen: Open vSwitch

Originalnachricht

An update for openvswitch3.1 is now available for Fast Datapath for Red Hat
Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Open vSwitch provides standard network bridging functions and support for the
OpenFlow protocol for remote per-flow control of traffic.

Security Fix(es):

* dpdk: Denial Of Service from malicious guest on hypervisors using DPDK Vhost
library (CVE-2024-11614)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

CVE-2024-11614: Out-of-bounds Read (CWE-125)
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung