RedHat: RHSA-2021-2205:01 Important: Red Hat OpenStack Platform 10.0

Advisories

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat OpenStack Platform 10.0 (openvswitch) security update
Advisory ID:       RHSA-2021:2205-01
Product:           Red Hat OpenStack Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:2205
Issue date:        2021-06-02
CVE Names:         CVE-2015-8011 
=====================================================================

1. Summary:

An update for openvswitch is now available for Red Hat OpenStack Platform
10 (Newton).

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

OpenStack 10.0 Tools for RHEL 7 - noarch
Red Hat OpenStack Platform 10.0 - ppc64le, x86_64

3. Description:

Open vSwitch provides standard network bridging functions and support for
the OpenFlow protocol for remote per-flow control of traffic.

Security Fix(es):

* buffer overflow in the lldp_decode function in daemon/protocols/lldp.c
(CVE-2015-8011)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1896536 - CVE-2015-8011 lldpd: buffer overflow in the lldp_decode function in daemon/protocols/lldp.c

6. Package List:

Red Hat OpenStack Platform 10.0:

Source:
openvswitch-2.9.9-1.el7fdp.src.rpm

ppc64le:
openvswitch-debuginfo-2.9.9-1.el7fdp.ppc64le.rpm
python-openvswitch-2.9.9-1.el7fdp.ppc64le.rpm

x86_64:
openvswitch-2.9.9-1.el7fdp.x86_64.rpm
openvswitch-debuginfo-2.9.9-1.el7fdp.x86_64.rpm
openvswitch-devel-2.9.9-1.el7fdp.x86_64.rpm
python-openvswitch-2.9.9-1.el7fdp.x86_64.rpm

OpenStack 10.0 Tools for RHEL 7:

Source:
openvswitch-2.9.9-1.el7fdp.src.rpm

noarch:
openvswitch-test-2.9.9-1.el7fdp.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2015-8011
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=r4uP
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2021-2205:01 Important: Red Hat OpenStack Platform 10.0

An update for openvswitch is now available for Red Hat OpenStack Platform 10 (Newton)

Summary

Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic.
Security Fix(es):
* buffer overflow in the lldp_decode function in daemon/protocols/lldp.c (CVE-2015-8011)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.

Solution

For details on how to apply this update, which includes the changesdescribed in this advisory, refer to:https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2015-8011 https://access.redhat.com/security/updates/classification/#important

Package List

Red Hat OpenStack Platform 10.0:
Source: openvswitch-2.9.9-1.el7fdp.src.rpm
ppc64le: openvswitch-debuginfo-2.9.9-1.el7fdp.ppc64le.rpm python-openvswitch-2.9.9-1.el7fdp.ppc64le.rpm
x86_64: openvswitch-2.9.9-1.el7fdp.x86_64.rpm openvswitch-debuginfo-2.9.9-1.el7fdp.x86_64.rpm openvswitch-devel-2.9.9-1.el7fdp.x86_64.rpm python-openvswitch-2.9.9-1.el7fdp.x86_64.rpm
OpenStack 10.0 Tools for RHEL 7:
Source: openvswitch-2.9.9-1.el7fdp.src.rpm
noarch: openvswitch-test-2.9.9-1.el7fdp.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

Severity
Advisory ID: RHSA-2021:2205-01
Product: Red Hat OpenStack Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2205
Issued Date: : 2021-06-02
CVE Names: CVE-2015-8011

Topic

An update for openvswitch is now available for Red Hat OpenStack Platform10 (Newton).Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.

Relevant Releases Architectures

OpenStack 10.0 Tools for RHEL 7 - noarch

Red Hat OpenStack Platform 10.0 - ppc64le, x86_64

Bugs Fixed

1896536 - CVE-2015-8011 lldpd: buffer overflow in the lldp_decode function in daemon/protocols/lldp.c

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.