drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in Red Hat OpenStack Platform
Name: |
Pufferüberlauf in Red Hat OpenStack Platform |
|
ID: |
RHSA-2021:2205-01 |
|
Distribution: |
Red Hat |
|
Plattformen: |
Red Hat OpenStack Platform |
|
Datum: |
Mi, 2. Juni 2021, 23:34 |
|
Referenzen: |
https://access.redhat.com/security/cve/CVE-2015-8011 |
|
Applikationen: |
Red Hat OpenStack Platform |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
===================================================================== Red Hat Security Advisory
Synopsis: Important: Red Hat OpenStack Platform 10.0 (openvswitch) security update Advisory ID: RHSA-2021:2205-01 Product: Red Hat OpenStack Platform Advisory URL: https://access.redhat.com/errata/RHSA-2021:2205 Issue date: 2021-06-02 CVE Names: CVE-2015-8011 =====================================================================
1. Summary:
An update for openvswitch is now available for Red Hat OpenStack Platform 10 (Newton).
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
2. Relevant releases/architectures:
OpenStack 10.0 Tools for RHEL 7 - noarch Red Hat OpenStack Platform 10.0 - ppc64le, x86_64
3. Description:
Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic.
Security Fix(es):
* buffer overflow in the lldp_decode function in daemon/protocols/lldp.c (CVE-2015-8011)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1896536 - CVE-2015-8011 lldpd: buffer overflow in the lldp_decode function in daemon/protocols/lldp.c
6. Package List:
Red Hat OpenStack Platform 10.0:
Source: openvswitch-2.9.9-1.el7fdp.src.rpm
ppc64le: openvswitch-debuginfo-2.9.9-1.el7fdp.ppc64le.rpm python-openvswitch-2.9.9-1.el7fdp.ppc64le.rpm
x86_64: openvswitch-2.9.9-1.el7fdp.x86_64.rpm openvswitch-debuginfo-2.9.9-1.el7fdp.x86_64.rpm openvswitch-devel-2.9.9-1.el7fdp.x86_64.rpm python-openvswitch-2.9.9-1.el7fdp.x86_64.rpm
OpenStack 10.0 Tools for RHEL 7:
Source: openvswitch-2.9.9-1.el7fdp.src.rpm
noarch: openvswitch-test-2.9.9-1.el7fdp.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-8011 https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYLeV+tzjgjWX9erEAQgBGBAAmuWUgopDcU1wMZR4YZ3VTvM+4Ua2hbXd li9QnxZwWlt4vNm6gvVI9BKfgyM2739bTuVpApKcO8s5NAbaIQisSdHCcxCMsY0b oN1Y4jMc6od4vqXFT36JZT5JicAlPh5ZZQ3teFm7THc3EsThChfJ0akvuVnQo2Th F5h1Sr6jhlfNoo1H1+QjAFzb8erKoS47eE9DfDa0NqVh9a8FR7YQUiOUr+xRP7gk FneCbbJ27YuLuzT9D2DA9KV0rvXsHrsp7F5YIafhkxUe0juGzHxpyihVriJqjnqQ O5vmPF7MVIK25TbG7EehAcKC1qivOVBIMIs7WomskW+PibHzfOdMms+hyqDll/rN k+pgJV5jR7tFx1wItGZz3tg2pxRK1anPytHLadvN+DHwg6cd95Sezdjy9ncAWhZ6 uhJ1RwwCYdxuVYHm8fR6DGYk+bdedeQPqa/gVPHwfIhK/R/gNLTR/gZ+Xb/4PT3P Tnaxv1F+g4kvpPv5/GYd2c+QlJLQuoNTzSJ/ZiBQ0X0srsPTRAyJycNdB+u3ADT9 3pcOfl1Ioeydr3UMNSHZ+rPEJT8HgnHL+JO0b2gTHZZJAblT0yczGo3I7bl/hiDz 4Ft9r7T8z+jM5ajBgaSvZrILIaa220+1vmfunlBlbZJjW/JtDVS5Wtr1eE3YezVO 8Br/A6Y5gWA= =r4uP -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce
|
|
|
|