First published: Thu Mar 07 2024(Updated: )
Important: openvswitch2.17 security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openvswitch2.17 | <2.17.0-148.el8fd | 2.17.0-148.el8fd |
redhat/network-scripts-openvswitch2.17 | <2.17.0-148.el8fd | 2.17.0-148.el8fd |
redhat/openvswitch2.17-debuginfo | <2.17.0-148.el8fd | 2.17.0-148.el8fd |
redhat/openvswitch2.17-debugsource | <2.17.0-148.el8fd | 2.17.0-148.el8fd |
redhat/openvswitch2.17-devel | <2.17.0-148.el8fd | 2.17.0-148.el8fd |
redhat/openvswitch2.17-ipsec | <2.17.0-148.el8fd | 2.17.0-148.el8fd |
redhat/openvswitch2.17-test | <2.17.0-148.el8fd | 2.17.0-148.el8fd |
redhat/python3-openvswitch2.17 | <2.17.0-148.el8fd | 2.17.0-148.el8fd |
redhat/python3-openvswitch2.17-debuginfo | <2.17.0-148.el8fd | 2.17.0-148.el8fd |
Red Hat Enterprise Linux Fast Datapath | ||
Red Hat Enterprise Linux Fast Datapath | ||
Red Hat Enterprise Linux Fast Datapath | ||
Red Hat Enterprise Linux Fast Datapath |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2024:1234 is classified as important due to issues with Open vSwitch's recovery from malformed Geneve metadata.
To fix RHSA-2024:1234, you should update the affected Open vSwitch packages to version 2.17.0-148.el8fd.
RHSA-2024:1234 affects various versions of Red Hat Enterprise Linux Fast Datapath and its related packages.
As of now, there are no public exploits reported for the vulnerabilities fixed in RHSA-2024:1234.
Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol, both of which are impacted by the vulnerability.