SUSE Security Update: Security update for openvswitch
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:2212-1
Rating:             important
References:         #1002734 #1041447 #1041470 #1050896 
Cross-References:   CVE-2017-9263 CVE-2017-9265
Affected Products:
                    SUSE Linux Enterprise Server 12-SP3
______________________________________________________________________________

   An update that solves two vulnerabilities and has two fixes
   is now available.

Description:

   This update for openvswitch fixes the following issues:


   - CVE-2017-9263: OpenFlow role status message can cause a call to abort()
     leading to application crash (bsc#1041470)

   - CVE-2017-9265: Buffer over-read while parsing message could lead to
     crash or maybe arbitrary code execution (bsc#1041447)

   - Do not restart the ovs-vswitchd and ovsdb-server services
     on package updates (bsc#1002734)

   - Do not restart the ovs-vswitchd, ovsdb-server and openvswitch services
     on package removals. This facilitates potential future package moves but
     also preserves connectivity when the package is removed (bsc#1050896)


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 12-SP3:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-2017-1348=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):

      openvswitch-2.7.0-3.3.1
      openvswitch-debuginfo-2.7.0-3.3.1
      openvswitch-debugsource-2.7.0-3.3.1


References:

   https://www.suse.com/security/cve/CVE-2017-9263.html
   https://www.suse.com/security/cve/CVE-2017-9265.html
   https://bugzilla.suse.com/1002734
   https://bugzilla.suse.com/1041447
   https://bugzilla.suse.com/1041470
   https://bugzilla.suse.com/1050896

SuSE: 2017:2212-1: important: openvswitch

August 18, 2017
An update that solves two vulnerabilities and has two fixes An update that solves two vulnerabilities and has two fixes An update that solves two vulnerabilities and has two fixes ...

Summary

This update for openvswitch fixes the following issues: - CVE-2017-9263: OpenFlow role status message can cause a call to abort() leading to application crash (bsc#1041470) - CVE-2017-9265: Buffer over-read while parsing message could lead to crash or maybe arbitrary code execution (bsc#1041447) - Do not restart the ovs-vswitchd and ovsdb-server services on package updates (bsc#1002734) - Do not restart the ovs-vswitchd, ovsdb-server and openvswitch services on package removals. This facilitates potential future package moves but also preserves connectivity when the package is removed (bsc#1050896) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12-SP3: zypper in -t patch SUSE-SLE-SERVER-12-SP3-2017-1348=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Lin...

Read the Full Advisory

References

#1002734 #1041447 #1041470 #1050896

Cross- CVE-2017-9263 CVE-2017-9265

Affected Products:

SUSE Linux Enterprise Server 12-SP3

https://www.suse.com/security/cve/CVE-2017-9263.html

https://www.suse.com/security/cve/CVE-2017-9265.html

https://bugzilla.suse.com/1002734

https://bugzilla.suse.com/1041447

https://bugzilla.suse.com/1041470

https://bugzilla.suse.com/1050896

Severity
Announcement ID: SUSE-SU-2017:2212-1
Rating: important

Related News