Advisory Published

RHSA-2020:2297: Moderate: openvswitch2.11 security, bug fix and enhancement update

First published: Tue May 26 2020(Updated: )

Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic.<br>Security Fix(es):<br><li> dpdk: librte_vhost Interger overflow in vhost_user_set_log_base() (CVE-2020-10722)</li> <li> dpdk: librte_vhost Integer truncation in vhost_user_check_and_alloc_queue_pair() (CVE-2020-10723)</li> <li> dpdk: librte_vhost Missing inputs validation in Vhost-crypto (CVE-2020-10724)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br><li> [RHEL8] Update OVS 2.11 to last branch-2.11 commit and DPDK 18.11.7 (BZ#1822654)</li> <li> [RHEL8] ingress qdisc gets removed (BZ#1826827)</li>

Affected SoftwareAffected VersionHow to fix
redhat/openvswitch2.11<2.11.0-54.20200327gita4efc59.el8fd
2.11.0-54.20200327gita4efc59.el8fd
redhat/network-scripts-openvswitch2.11<2.11.0-54.20200327gita4efc59.el8fd
2.11.0-54.20200327gita4efc59.el8fd
redhat/openvswitch2.11-debuginfo<2.11.0-54.20200327gita4efc59.el8fd
2.11.0-54.20200327gita4efc59.el8fd
redhat/openvswitch2.11-debugsource<2.11.0-54.20200327gita4efc59.el8fd
2.11.0-54.20200327gita4efc59.el8fd
redhat/openvswitch2.11-devel<2.11.0-54.20200327gita4efc59.el8fd
2.11.0-54.20200327gita4efc59.el8fd
redhat/openvswitch2.11-test<2.11.0-54.20200327gita4efc59.el8fd
2.11.0-54.20200327gita4efc59.el8fd
redhat/python3-openvswitch2.11<2.11.0-54.20200327gita4efc59.el8fd
2.11.0-54.20200327gita4efc59.el8fd
redhat/python3-openvswitch2.11-debuginfo<2.11.0-54.20200327gita4efc59.el8fd
2.11.0-54.20200327gita4efc59.el8fd

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of RHSA-2020:2297?

    The severity of RHSA-2020:2297 is classified as important.

  • How do I fix RHSA-2020:2297?

    To fix RHSA-2020:2297, you need to update the openvswitch packages to version 2.11.0-54.20200327gita4efc59.el8fd.

  • What specific vulnerabilities are addressed in RHSA-2020:2297?

    RHSA-2020:2297 addresses an integer overflow vulnerability in vhost_user_set_log_base() (CVE-2020-10722).

  • Which versions of openvswitch are affected by RHSA-2020:2297?

    RHSA-2020:2297 affects openvswitch version 2.11.0-54.20200327gita4efc59.el8fd and earlier.

  • Is it necessary to reboot after applying the fix for RHSA-2020:2297?

    Yes, it is recommended to reboot the system after applying the fix for RHSA-2020:2297 to ensure all changes take effect.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203