-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: openvswitch security update
Advisory ID:       RHSA-2016:0537-01
Product:           Red Hat Enterprise Linux OpenStack Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2016:0537.html
Issue date:        2016-03-30
CVE Names:         CVE-2016-2074 
====================================================================
1. Summary:

An update for openvswitch is now available for Red Hat Enterprise Linux
OpenStack Platform 7.0 (Kilo) for RHEL 7.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux OpenStack Platform 7.0 for RHEL 7 - noarch, x86_64

3. Description:

Open vSwitch provides standard network bridging functions and support for
the OpenFlow protocol for remote per-flow control of traffic.

Security Fix(es):

* A buffer overflow flaw was discovered in the OVS processing of MPLS
labels. A remote attacker able to deliver a frame containing a malicious
MPLS label that would be processed by OVS could trigger the flaw and use
the resulting memory corruption to cause a denial of service (DoS) or,
possibly, execute arbitrary code. (CVE-2016-2074)

Red Hat would like to thank the Open vSwitch project for reporting this
issue. Upstream acknowledges Kashyap Thimmaraju and Bhargava Shastry as the
original reporters.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1318553 - CVE-2016-2074 openvswitch: MPLS buffer overflow vulnerability

6. Package List:

Red Hat Enterprise Linux OpenStack Platform 7.0 for RHEL 7:

Source:
openvswitch-2.4.0-2.el7_2.src.rpm
openvswitch-dpdk-2.4.0-0.10346.git97bab959.3.el7_2.src.rpm

noarch:
python-openvswitch-2.4.0-2.el7_2.noarch.rpm

x86_64:
openvswitch-2.4.0-2.el7_2.x86_64.rpm
openvswitch-debuginfo-2.4.0-2.el7_2.x86_64.rpm
openvswitch-dpdk-2.4.0-0.10346.git97bab959.3.el7_2.x86_64.rpm
openvswitch-dpdk-debuginfo-2.4.0-0.10346.git97bab959.3.el7_2.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2016-2074
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2016 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFW/DxbXlSAg2UNWIIRAliQAJ9x2r8+3bKk54bwf4BWcq8FJjLGTgCgrUTp
hEpb9aQWfzxRzsu9TWpjQNk=DolP
-----END PGP SIGNATURE-----


-- 
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list

RedHat: RHSA-2016-0537:01 Important: openvswitch security update

An update for openvswitch is now available for Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7

Summary

Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic.
Security Fix(es):
* A buffer overflow flaw was discovered in the OVS processing of MPLS labels. A remote attacker able to deliver a frame containing a malicious MPLS label that would be processed by OVS could trigger the flaw and use the resulting memory corruption to cause a denial of service (DoS) or, possibly, execute arbitrary code. (CVE-2016-2074)
Red Hat would like to thank the Open vSwitch project for reporting this issue. Upstream acknowledges Kashyap Thimmaraju and Bhargava Shastry as the original reporters.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2016-2074 https://access.redhat.com/security/updates/classification/#important

Package List

Red Hat Enterprise Linux OpenStack Platform 7.0 for RHEL 7:
Source: openvswitch-2.4.0-2.el7_2.src.rpm openvswitch-dpdk-2.4.0-0.10346.git97bab959.3.el7_2.src.rpm
noarch: python-openvswitch-2.4.0-2.el7_2.noarch.rpm
x86_64: openvswitch-2.4.0-2.el7_2.x86_64.rpm openvswitch-debuginfo-2.4.0-2.el7_2.x86_64.rpm openvswitch-dpdk-2.4.0-0.10346.git97bab959.3.el7_2.x86_64.rpm openvswitch-dpdk-debuginfo-2.4.0-0.10346.git97bab959.3.el7_2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2016:0537-01
Product: Red Hat Enterprise Linux OpenStack Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2016:0537.html
Issued Date: : 2016-03-30
CVE Names: CVE-2016-2074

Topic

An update for openvswitch is now available for Red Hat Enterprise LinuxOpenStack Platform 7.0 (Kilo) for RHEL 7.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux OpenStack Platform 7.0 for RHEL 7 - noarch, x86_64


Bugs Fixed

1318553 - CVE-2016-2074 openvswitch: MPLS buffer overflow vulnerability


Related News