First published: Tue Mar 19 2024(Updated: )
Important: ovn23.06 security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ovn23.06 | <23.06.1-112.el9fd | 23.06.1-112.el9fd |
redhat/ovn23.06-central | <23.06.1-112.el9fd | 23.06.1-112.el9fd |
redhat/ovn23.06-central-debuginfo | <23.06.1-112.el9fd | 23.06.1-112.el9fd |
redhat/ovn23.06-debuginfo | <23.06.1-112.el9fd | 23.06.1-112.el9fd |
redhat/ovn23.06-debugsource | <23.06.1-112.el9fd | 23.06.1-112.el9fd |
redhat/ovn23.06-host | <23.06.1-112.el9fd | 23.06.1-112.el9fd |
redhat/ovn23.06-host-debuginfo | <23.06.1-112.el9fd | 23.06.1-112.el9fd |
redhat/ovn23.06-vtep | <23.06.1-112.el9fd | 23.06.1-112.el9fd |
redhat/ovn23.06-vtep-debuginfo | <23.06.1-112.el9fd | 23.06.1-112.el9fd |
Red Hat Enterprise Linux Fast Datapath |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:1391 is classified as important.
To fix RHSA-2024:1391, update the affected packages to version 23.06.1-112.el9fd.
RHSA-2024:1391 affects multiple OVN packages, including ovn23.06 and ovn23.06-central.
RHSA-2024:1391 addresses vulnerabilities in the Open Virtual Network, enhancing security features.
Typically, a reboot may not be necessary after applying the fix for RHSA-2024:1391, but it is recommended to verify.