First published: Thu Mar 07 2024(Updated: )
Important: openvswitch3.1 security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openvswitch3.1 | <3.1.0-88.el9fd | 3.1.0-88.el9fd |
redhat/openvswitch3.1-debuginfo | <3.1.0-88.el9fd | 3.1.0-88.el9fd |
redhat/openvswitch3.1-debugsource | <3.1.0-88.el9fd | 3.1.0-88.el9fd |
redhat/openvswitch3.1-devel | <3.1.0-88.el9fd | 3.1.0-88.el9fd |
redhat/openvswitch3.1-ipsec | <3.1.0-88.el9fd | 3.1.0-88.el9fd |
redhat/openvswitch3.1-test | <3.1.0-88.el9fd | 3.1.0-88.el9fd |
redhat/python3-openvswitch3.1 | <3.1.0-88.el9fd | 3.1.0-88.el9fd |
redhat/python3-openvswitch3.1-debuginfo | <3.1.0-88.el9fd | 3.1.0-88.el9fd |
Red Hat Enterprise Linux Fast Datapath | ||
Red Hat Enterprise Linux Fast Datapath | ||
Red Hat Enterprise Linux Fast Datapath | ||
Red Hat Enterprise Linux Fast Datapath |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2024:1227 is classified as important due to a security vulnerability in Open vSwitch.
To fix RHSA-2024:1227, update the Open vSwitch package to version 3.1.0-88.el9fd or later.
RHSA-2024:1227 affects multiple packages including openvswitch3.1 and its related debug and development components.
RHSA-2024:1227 addresses a vulnerability where ovs-vswitch fails to recover after malformed Geneve metadata.
The vendor of the affected software in RHSA-2024:1227 is Red Hat.