Security update for openvswitch
Announcement ID: | SUSE-SU-2018:0311-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves four vulnerabilities can now be installed.
Description:
This update for openvswitch fixes the following issues:
- CVE-2017-9263: While parsing an OpenFlow role status message, there is a call to the abort() functio for undefined role status reasons in the function
ofp_print_role_status_message
inlib/ofp-print.c
that may be leveraged toward a remote DoS attack by a malicious switch. (bsc#1041470) - CVE-2017-9265: Buffer over-read while parsing the group mod OpenFlow message sent from the controller in
lib/ofp-util.c
in the functionofputil_pull_ofp15_group_mod
.(bsc#1041447) - CVE-2017-9214: While parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function
ofputil_pull_queue_get_config_reply10
inlib/ofp-util.c
. (bsc#1040543) - CVE-2017-14970: In lib/ofp-util.c, there are multiple memory leaks while parsing malformed OpenFlow group mod messages.(bsc#1061310)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2
zypper in -t patch SUSE-SLE-RPI-12-SP2-2018-229=1
-
SUSE Linux Enterprise High Performance Computing 12 SP2
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-229=1
-
SUSE Linux Enterprise Server 12 SP2
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-229=1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP2
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-229=1
Package List:
-
SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2 (aarch64)
- openvswitch-debugsource-2.5.1-25.12.7
- openvswitch-debuginfo-2.5.1-25.12.7
- openvswitch-2.5.1-25.12.7
- openvswitch-switch-2.5.1-25.12.7
- openvswitch-switch-debuginfo-2.5.1-25.12.7
-
SUSE Linux Enterprise High Performance Computing 12 SP2 (aarch64 x86_64)
- openvswitch-debugsource-2.5.1-25.12.7
- openvswitch-debuginfo-2.5.1-25.12.7
- openvswitch-2.5.1-25.12.7
- openvswitch-switch-2.5.1-25.12.7
- openvswitch-switch-debuginfo-2.5.1-25.12.7
-
SUSE Linux Enterprise High Performance Computing 12 SP2 (x86_64)
- openvswitch-dpdk-2.5.1-25.12.8
- openvswitch-dpdk-debugsource-2.5.1-25.12.8
- openvswitch-dpdk-switch-2.5.1-25.12.8
- openvswitch-dpdk-debuginfo-2.5.1-25.12.8
- openvswitch-dpdk-switch-debuginfo-2.5.1-25.12.8
-
SUSE Linux Enterprise Server 12 SP2 (aarch64 ppc64le s390x x86_64)
- openvswitch-debugsource-2.5.1-25.12.7
- openvswitch-debuginfo-2.5.1-25.12.7
- openvswitch-2.5.1-25.12.7
- openvswitch-switch-2.5.1-25.12.7
- openvswitch-switch-debuginfo-2.5.1-25.12.7
-
SUSE Linux Enterprise Server 12 SP2 (x86_64)
- openvswitch-dpdk-2.5.1-25.12.8
- openvswitch-dpdk-debugsource-2.5.1-25.12.8
- openvswitch-dpdk-switch-2.5.1-25.12.8
- openvswitch-dpdk-debuginfo-2.5.1-25.12.8
- openvswitch-dpdk-switch-debuginfo-2.5.1-25.12.8
-
SUSE Linux Enterprise Server for SAP Applications 12 SP2 (ppc64le x86_64)
- openvswitch-debugsource-2.5.1-25.12.7
- openvswitch-debuginfo-2.5.1-25.12.7
- openvswitch-2.5.1-25.12.7
- openvswitch-switch-2.5.1-25.12.7
- openvswitch-switch-debuginfo-2.5.1-25.12.7
-
SUSE Linux Enterprise Server for SAP Applications 12 SP2 (x86_64)
- openvswitch-dpdk-2.5.1-25.12.8
- openvswitch-dpdk-debugsource-2.5.1-25.12.8
- openvswitch-dpdk-switch-2.5.1-25.12.8
- openvswitch-dpdk-debuginfo-2.5.1-25.12.8
- openvswitch-dpdk-switch-debuginfo-2.5.1-25.12.8
References:
- https://www.suse.com/security/cve/CVE-2017-14970.html
- https://www.suse.com/security/cve/CVE-2017-9214.html
- https://www.suse.com/security/cve/CVE-2017-9263.html
- https://www.suse.com/security/cve/CVE-2017-9265.html
- https://bugzilla.suse.com/show_bug.cgi?id=1040543
- https://bugzilla.suse.com/show_bug.cgi?id=1041447
- https://bugzilla.suse.com/show_bug.cgi?id=1041470
- https://bugzilla.suse.com/show_bug.cgi?id=1061310