First published: Thu Mar 07 2024(Updated: )
Important: openvswitch3.1 security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openvswitch3.1 | <3.1.0-96.el8fd | 3.1.0-96.el8fd |
redhat/network-scripts-openvswitch3.1 | <3.1.0-96.el8fd | 3.1.0-96.el8fd |
redhat/openvswitch3.1-debuginfo | <3.1.0-96.el8fd | 3.1.0-96.el8fd |
redhat/openvswitch3.1-debugsource | <3.1.0-96.el8fd | 3.1.0-96.el8fd |
redhat/openvswitch3.1-devel | <3.1.0-96.el8fd | 3.1.0-96.el8fd |
redhat/openvswitch3.1-ipsec | <3.1.0-96.el8fd | 3.1.0-96.el8fd |
redhat/openvswitch3.1-test | <3.1.0-96.el8fd | 3.1.0-96.el8fd |
redhat/python3-openvswitch3.1 | <3.1.0-96.el8fd | 3.1.0-96.el8fd |
redhat/python3-openvswitch3.1-debuginfo | <3.1.0-96.el8fd | 3.1.0-96.el8fd |
Red Hat Enterprise Linux Fast Datapath | ||
Red Hat Enterprise Linux Fast Datapath | ||
Red Hat Enterprise Linux Fast Datapath | ||
Red Hat Enterprise Linux Fast Datapath |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:1235 is classified as Important.
To fix RHSA-2024:1235, you need to update the affected packages to version 3.1.0-96.el8fd or later.
RHSA-2024:1235 addresses a vulnerability in Open vSwitch that prevents it from recovering after malformed Geneve metadata packets.
Affected packages include openvswitch3.1, network-scripts-openvswitch3.1, and python3-openvswitch3.1 among others.
Currently, the recommended action is to apply the security update rather than rely on a workaround.