drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in openvswitch
Name: |
Denial of Service in openvswitch |
|
ID: |
SUSE-SU-2023:2296-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
SUSE * SUSE Linux Enterprise Real Time 15 SP4, SUSE * SUSE Linux Enterprise High Performance Computing 15 SP4, SUSE * SUSE Linux Enterprise Server 15 SP4, SUSE * SUSE Linux Enterprise Desktop 15 SP4, SUSE * SUSE Manager Proxy 4.3, SUSE * SUSE Manager Retail Branch Server 4.3, SUSE * SUSE Linux Enterprise Server for SAP Applications 15 SP4, SUSE * openSUSE Leap 15.4, SUSE * SUSE Manager Server 4.3, SUSE An update that solves one vulnerability can now be installed., SUSE * SUSE Linux Enterprise Micro 5.3, SUSE * SUSE Package Hub 15 15-SP4, SUSE * SUSE Linux Enterprise Micro 5.4, SUSE * Server Applications Module 15-SP4, SUSE * SUSE Linux Enterprise Real Time 15 SP5, SUSE * SUSE Linux Enterprise Server for SAP Applications 15 SP5, SUSE * SUSE Linux Enterprise Server 15 SP5, SUSE * SUSE Linux Enterprise Desktop 15 SP5, SUSE * openSUSE Leap 15.5, SUSE * SUSE Package Hub 15 15-SP5, SUSE * Legacy Module 15-SP5 |
|
Datum: |
Fr, 26. Mai 2023, 07:48 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1668 |
|
Applikationen: |
Open vSwitch |
|
Originalnachricht |
--===============6845026981795070149== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
# Security update for openvswitch
Announcement ID: SUSE-SU-2023:2296-1 Rating: important References:
* #1210054
Cross-References:
* CVE-2023-1668
CVSS scores:
* CVE-2023-1668 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-1668 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
Affected Products:
* Legacy Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Server Applications Module 15-SP4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP4 * SUSE Package Hub 15 15-SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for openvswitch fixes the following issues:
* CVE-2023-1668: Fixed remote traffic denial of service via crafted packets with IP proto 0 (bsc#1210054).
## Patch Instructions:
To install this SUSE Important update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-2296=1
* openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-2296=1
* Legacy Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2023-2296=1
* SUSE Package Hub 15 15-SP4 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-2296=1
* SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-2296=1
* Server Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2023-2296=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * openvswitch-pki-2.14.2-150400.24.9.1 * python3-ovs-2.14.2-150400.24.9.1 * ovn-devel-20.06.2-150400.24.9.1 * ovn-vtep-debuginfo-20.06.2-150400.24.9.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.9.1 * ovn-vtep-20.06.2-150400.24.9.1 * libopenvswitch-2_14-0-2.14.2-150400.24.9.1 * openvswitch-vtep-2.14.2-150400.24.9.1 * openvswitch-test-2.14.2-150400.24.9.1 * openvswitch-ipsec-2.14.2-150400.24.9.1 * openvswitch-devel-2.14.2-150400.24.9.1 * ovn-host-20.06.2-150400.24.9.1 * ovn-central-20.06.2-150400.24.9.1 * openvswitch-2.14.2-150400.24.9.1 * openvswitch-vtep-debuginfo-2.14.2-150400.24.9.1 * openvswitch-debuginfo-2.14.2-150400.24.9.1 * libovn-20_06-0-20.06.2-150400.24.9.1 * ovn-host-debuginfo-20.06.2-150400.24.9.1 * ovn-debuginfo-20.06.2-150400.24.9.1 * ovn-docker-20.06.2-150400.24.9.1 * ovn-central-debuginfo-20.06.2-150400.24.9.1 * openvswitch-debugsource-2.14.2-150400.24.9.1 * ovn-20.06.2-150400.24.9.1 * libovn-20_06-0-debuginfo-20.06.2-150400.24.9.1 * openvswitch-test-debuginfo-2.14.2-150400.24.9.1 * openSUSE Leap 15.4 (noarch) * openvswitch-doc-2.14.2-150400.24.9.1 * ovn-doc-20.06.2-150400.24.9.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * openvswitch-pki-2.14.2-150400.24.9.1 * python3-ovs-2.14.2-150400.24.9.1 * ovn-devel-20.06.2-150400.24.9.1 * ovn-vtep-debuginfo-20.06.2-150400.24.9.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.9.1 * ovn-vtep-20.06.2-150400.24.9.1 * libopenvswitch-2_14-0-2.14.2-150400.24.9.1 * openvswitch-vtep-2.14.2-150400.24.9.1 * openvswitch-test-2.14.2-150400.24.9.1 * openvswitch-ipsec-2.14.2-150400.24.9.1 * openvswitch-devel-2.14.2-150400.24.9.1 * ovn-host-20.06.2-150400.24.9.1 * ovn-central-20.06.2-150400.24.9.1 * openvswitch-2.14.2-150400.24.9.1 * openvswitch-vtep-debuginfo-2.14.2-150400.24.9.1 * openvswitch-debuginfo-2.14.2-150400.24.9.1 * libovn-20_06-0-20.06.2-150400.24.9.1 * ovn-host-debuginfo-20.06.2-150400.24.9.1 * ovn-debuginfo-20.06.2-150400.24.9.1 * ovn-docker-20.06.2-150400.24.9.1 * ovn-central-debuginfo-20.06.2-150400.24.9.1 * openvswitch-debugsource-2.14.2-150400.24.9.1 * ovn-20.06.2-150400.24.9.1 * libovn-20_06-0-debuginfo-20.06.2-150400.24.9.1 * openvswitch-test-debuginfo-2.14.2-150400.24.9.1 * openSUSE Leap 15.5 (noarch) * openvswitch-doc-2.14.2-150400.24.9.1 * ovn-doc-20.06.2-150400.24.9.1 * Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64) * openvswitch-pki-2.14.2-150400.24.9.1 * python3-ovs-2.14.2-150400.24.9.1 * ovn-devel-20.06.2-150400.24.9.1 * ovn-vtep-debuginfo-20.06.2-150400.24.9.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.9.1 * ovn-vtep-20.06.2-150400.24.9.1 * libopenvswitch-2_14-0-2.14.2-150400.24.9.1 * openvswitch-vtep-2.14.2-150400.24.9.1 * openvswitch-test-2.14.2-150400.24.9.1 * openvswitch-ipsec-2.14.2-150400.24.9.1 * openvswitch-devel-2.14.2-150400.24.9.1 * ovn-host-20.06.2-150400.24.9.1 * ovn-central-20.06.2-150400.24.9.1 * openvswitch-2.14.2-150400.24.9.1 * openvswitch-vtep-debuginfo-2.14.2-150400.24.9.1 * openvswitch-debuginfo-2.14.2-150400.24.9.1 * libovn-20_06-0-20.06.2-150400.24.9.1 * ovn-host-debuginfo-20.06.2-150400.24.9.1 * ovn-debuginfo-20.06.2-150400.24.9.1 * ovn-docker-20.06.2-150400.24.9.1 * ovn-central-debuginfo-20.06.2-150400.24.9.1 * openvswitch-debugsource-2.14.2-150400.24.9.1 * ovn-20.06.2-150400.24.9.1 * libovn-20_06-0-debuginfo-20.06.2-150400.24.9.1 * openvswitch-test-debuginfo-2.14.2-150400.24.9.1 * SUSE Package Hub 15 15-SP4 (aarch64 ppc64le s390x x86_64) * python3-ovs-2.14.2-150400.24.9.1 * openvswitch-debugsource-2.14.2-150400.24.9.1 * openvswitch-debuginfo-2.14.2-150400.24.9.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * python3-ovs-2.14.2-150400.24.9.1 * openvswitch-debugsource-2.14.2-150400.24.9.1 * openvswitch-debuginfo-2.14.2-150400.24.9.1 * Server Applications Module 15-SP4 (aarch64 ppc64le s390x x86_64) * openvswitch-pki-2.14.2-150400.24.9.1 * python3-ovs-2.14.2-150400.24.9.1 * ovn-devel-20.06.2-150400.24.9.1 * ovn-vtep-debuginfo-20.06.2-150400.24.9.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.9.1 * ovn-vtep-20.06.2-150400.24.9.1 * libopenvswitch-2_14-0-2.14.2-150400.24.9.1 * openvswitch-vtep-2.14.2-150400.24.9.1 * openvswitch-test-2.14.2-150400.24.9.1 * openvswitch-ipsec-2.14.2-150400.24.9.1 * openvswitch-devel-2.14.2-150400.24.9.1 * ovn-host-20.06.2-150400.24.9.1 * ovn-central-20.06.2-150400.24.9.1 * openvswitch-2.14.2-150400.24.9.1 * openvswitch-vtep-debuginfo-2.14.2-150400.24.9.1 * openvswitch-debuginfo-2.14.2-150400.24.9.1 * libovn-20_06-0-20.06.2-150400.24.9.1 * ovn-host-debuginfo-20.06.2-150400.24.9.1 * ovn-debuginfo-20.06.2-150400.24.9.1 * ovn-docker-20.06.2-150400.24.9.1 * ovn-central-debuginfo-20.06.2-150400.24.9.1 * openvswitch-debugsource-2.14.2-150400.24.9.1 * ovn-20.06.2-150400.24.9.1 * libovn-20_06-0-debuginfo-20.06.2-150400.24.9.1 * openvswitch-test-debuginfo-2.14.2-150400.24.9.1
## References:
* https://www.suse.com/security/cve/CVE-2023-1668.html * https://bugzilla.suse.com/show_bug.cgi?id=1210054
--===============6845026981795070149== Content-Type: text/html; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
<div class="container"> <h1>Security update for openvswitch</h1>
<table class="table table-striped table-bordered"> <tbody> <tr> <th>Announcement ID:</th> <td>SUSE-SU-2023:2296-1</td> </tr> <tr> <th>Rating:</th> <td>important</td> </tr> <tr> <th>References:</th> <td> <ul> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210054">#1210054</a> </li> </ul> </td> </tr> <tr> <th> Cross-References: </th> <td> <ul> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-1668.html">CVE-2023-1668</a> </li> </ul> </td> </tr> <tr> <th>CVSS scores:</th> <td> <ul class="list-group"> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-1668</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-1668</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">8.2</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H</span> </li> </ul> </td> </tr> <tr> <th>Affected Products:</th> <td> <ul class="list-group"> <li class="list-group-item">Legacy Module 15-SP5</li> <li class="list-group-item">openSUSE Leap 15.4</li> <li class="list-group-item">openSUSE Leap 15.5</li> <li class="list-group-item">Server Applications Module 15-SP4</li> <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP4</li> <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP5</li> <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP4</li> <li class="list-group-item">SUSE Linux Enterprise Micro 5.3</li> <li class="list-group-item">SUSE Linux Enterprise Micro 5.4</li> <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP4</li> <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP5</li> <li class="list-group-item">SUSE Linux Enterprise Server 15 SP4</li> <li class="list-group-item">SUSE Linux Enterprise Server 15 SP5</li> <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP4</li> <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP5</li> <li class="list-group-item">SUSE Manager Proxy 4.3</li> <li class="list-group-item">SUSE Manager Retail Branch Server 4.3</li> <li class="list-group-item">SUSE Manager Server 4.3</li> <li class="list-group-item">SUSE Package Hub 15 15-SP4</li> <li class="list-group-item">SUSE Package Hub 15 15-SP5</li> </ul> </td> </tr> </tbody> </table>
<p>An update that solves one vulnerability can now be installed.</p>
<h2>Description:</h2> <p>This update for openvswitch fixes the following issues:</p> <ul> <li>CVE-2023-1668: Fixed remote traffic denial of service via crafted packets with IP proto 0 (bsc#1210054).</li> </ul>
<h2>Patch Instructions:</h2> <p> To install this SUSE Important update use the SUSE recommended installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product: </p> <ul class="list-group"> <li class="list-group-item"> openSUSE Leap 15.4 <br/> <code>zypper in -t patch openSUSE-SLE-15.4-2023-2296=1</code> </li> <li class="list-group-item"> openSUSE Leap 15.5 <br/> <code>zypper in -t patch openSUSE-SLE-15.5-2023-2296=1</code> </li> <li class="list-group-item"> Legacy Module 15-SP5 <br/> <code>zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2023-2296=1</code> </li> <li class="list-group-item"> SUSE Package Hub 15 15-SP4 <br/> <code>zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-2296=1</code> </li> <li class="list-group-item"> SUSE Package Hub 15 15-SP5 <br/> <code>zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-2296=1</code> </li> <li class="list-group-item"> Server Applications Module 15-SP4 <br/> <code>zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2023-2296=1</code> </li> </ul>
<h2>Package List:</h2> <ul> <li> openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) <ul> <li>openvswitch-pki-2.14.2-150400.24.9.1</li> <li>python3-ovs-2.14.2-150400.24.9.1</li> <li>ovn-devel-20.06.2-150400.24.9.1</li> <li>ovn-vtep-debuginfo-20.06.2-150400.24.9.1</li> <li>libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.9.1</li> <li>ovn-vtep-20.06.2-150400.24.9.1</li> <li>libopenvswitch-2_14-0-2.14.2-150400.24.9.1</li> <li>openvswitch-vtep-2.14.2-150400.24.9.1</li> <li>openvswitch-test-2.14.2-150400.24.9.1</li> <li>openvswitch-ipsec-2.14.2-150400.24.9.1</li> <li>openvswitch-devel-2.14.2-150400.24.9.1</li> <li>ovn-host-20.06.2-150400.24.9.1</li> <li>ovn-central-20.06.2-150400.24.9.1</li> <li>openvswitch-2.14.2-150400.24.9.1</li> <li>openvswitch-vtep-debuginfo-2.14.2-150400.24.9.1</li> <li>openvswitch-debuginfo-2.14.2-150400.24.9.1</li> <li>libovn-20_06-0-20.06.2-150400.24.9.1</li> <li>ovn-host-debuginfo-20.06.2-150400.24.9.1</li> <li>ovn-debuginfo-20.06.2-150400.24.9.1</li> <li>ovn-docker-20.06.2-150400.24.9.1</li> <li>ovn-central-debuginfo-20.06.2-150400.24.9.1</li> <li>openvswitch-debugsource-2.14.2-150400.24.9.1</li> <li>ovn-20.06.2-150400.24.9.1</li> <li>libovn-20_06-0-debuginfo-20.06.2-150400.24.9.1</li> <li>openvswitch-test-debuginfo-2.14.2-150400.24.9.1</li> </ul> </li> <li> openSUSE Leap 15.4 (noarch) <ul> <li>openvswitch-doc-2.14.2-150400.24.9.1</li> <li>ovn-doc-20.06.2-150400.24.9.1</li> </ul> </li> <li> openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) <ul> <li>openvswitch-pki-2.14.2-150400.24.9.1</li> <li>python3-ovs-2.14.2-150400.24.9.1</li> <li>ovn-devel-20.06.2-150400.24.9.1</li> <li>ovn-vtep-debuginfo-20.06.2-150400.24.9.1</li> <li>libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.9.1</li> <li>ovn-vtep-20.06.2-150400.24.9.1</li> <li>libopenvswitch-2_14-0-2.14.2-150400.24.9.1</li> <li>openvswitch-vtep-2.14.2-150400.24.9.1</li> <li>openvswitch-test-2.14.2-150400.24.9.1</li> <li>openvswitch-ipsec-2.14.2-150400.24.9.1</li> <li>openvswitch-devel-2.14.2-150400.24.9.1</li> <li>ovn-host-20.06.2-150400.24.9.1</li> <li>ovn-central-20.06.2-150400.24.9.1</li> <li>openvswitch-2.14.2-150400.24.9.1</li> <li>openvswitch-vtep-debuginfo-2.14.2-150400.24.9.1</li> <li>openvswitch-debuginfo-2.14.2-150400.24.9.1</li> <li>libovn-20_06-0-20.06.2-150400.24.9.1</li> <li>ovn-host-debuginfo-20.06.2-150400.24.9.1</li> <li>ovn-debuginfo-20.06.2-150400.24.9.1</li> <li>ovn-docker-20.06.2-150400.24.9.1</li> <li>ovn-central-debuginfo-20.06.2-150400.24.9.1</li> <li>openvswitch-debugsource-2.14.2-150400.24.9.1</li> <li>ovn-20.06.2-150400.24.9.1</li> <li>libovn-20_06-0-debuginfo-20.06.2-150400.24.9.1</li> <li>openvswitch-test-debuginfo-2.14.2-150400.24.9.1</li> </ul> </li> <li> openSUSE Leap 15.5 (noarch) <ul> <li>openvswitch-doc-2.14.2-150400.24.9.1</li> <li>ovn-doc-20.06.2-150400.24.9.1</li> </ul> </li> <li> Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64) <ul> <li>openvswitch-pki-2.14.2-150400.24.9.1</li> <li>python3-ovs-2.14.2-150400.24.9.1</li> <li>ovn-devel-20.06.2-150400.24.9.1</li> <li>ovn-vtep-debuginfo-20.06.2-150400.24.9.1</li> <li>libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.9.1</li> <li>ovn-vtep-20.06.2-150400.24.9.1</li> <li>libopenvswitch-2_14-0-2.14.2-150400.24.9.1</li> <li>openvswitch-vtep-2.14.2-150400.24.9.1</li> <li>openvswitch-test-2.14.2-150400.24.9.1</li> <li>openvswitch-ipsec-2.14.2-150400.24.9.1</li> <li>openvswitch-devel-2.14.2-150400.24.9.1</li> <li>ovn-host-20.06.2-150400.24.9.1</li> <li>ovn-central-20.06.2-150400.24.9.1</li> <li>openvswitch-2.14.2-150400.24.9.1</li> <li>openvswitch-vtep-debuginfo-2.14.2-150400.24.9.1</li> <li>openvswitch-debuginfo-2.14.2-150400.24.9.1</li> <li>libovn-20_06-0-20.06.2-150400.24.9.1</li> <li>ovn-host-debuginfo-20.06.2-150400.24.9.1</li> <li>ovn-debuginfo-20.06.2-150400.24.9.1</li> <li>ovn-docker-20.06.2-150400.24.9.1</li> <li>ovn-central-debuginfo-20.06.2-150400.24.9.1</li> <li>openvswitch-debugsource-2.14.2-150400.24.9.1</li> <li>ovn-20.06.2-150400.24.9.1</li> <li>libovn-20_06-0-debuginfo-20.06.2-150400.24.9.1</li> <li>openvswitch-test-debuginfo-2.14.2-150400.24.9.1</li> </ul> </li> <li> SUSE Package Hub 15 15-SP4 (aarch64 ppc64le s390x x86_64) <ul> <li>python3-ovs-2.14.2-150400.24.9.1</li> <li>openvswitch-debugsource-2.14.2-150400.24.9.1</li> <li>openvswitch-debuginfo-2.14.2-150400.24.9.1</li> </ul> </li> <li> SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) <ul> <li>python3-ovs-2.14.2-150400.24.9.1</li> <li>openvswitch-debugsource-2.14.2-150400.24.9.1</li> <li>openvswitch-debuginfo-2.14.2-150400.24.9.1</li> </ul> </li> <li> Server Applications Module 15-SP4 (aarch64 ppc64le s390x x86_64) <ul> <li>openvswitch-pki-2.14.2-150400.24.9.1</li> <li>python3-ovs-2.14.2-150400.24.9.1</li> <li>ovn-devel-20.06.2-150400.24.9.1</li> <li>ovn-vtep-debuginfo-20.06.2-150400.24.9.1</li> <li>libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.9.1</li> <li>ovn-vtep-20.06.2-150400.24.9.1</li> <li>libopenvswitch-2_14-0-2.14.2-150400.24.9.1</li> <li>openvswitch-vtep-2.14.2-150400.24.9.1</li> <li>openvswitch-test-2.14.2-150400.24.9.1</li> <li>openvswitch-ipsec-2.14.2-150400.24.9.1</li> <li>openvswitch-devel-2.14.2-150400.24.9.1</li> <li>ovn-host-20.06.2-150400.24.9.1</li> <li>ovn-central-20.06.2-150400.24.9.1</li> <li>openvswitch-2.14.2-150400.24.9.1</li> <li>openvswitch-vtep-debuginfo-2.14.2-150400.24.9.1</li> <li>openvswitch-debuginfo-2.14.2-150400.24.9.1</li> <li>libovn-20_06-0-20.06.2-150400.24.9.1</li> <li>ovn-host-debuginfo-20.06.2-150400.24.9.1</li> <li>ovn-debuginfo-20.06.2-150400.24.9.1</li> <li>ovn-docker-20.06.2-150400.24.9.1</li> <li>ovn-central-debuginfo-20.06.2-150400.24.9.1</li> <li>openvswitch-debugsource-2.14.2-150400.24.9.1</li> <li>ovn-20.06.2-150400.24.9.1</li> <li>libovn-20_06-0-debuginfo-20.06.2-150400.24.9.1</li> <li>openvswitch-test-debuginfo-2.14.2-150400.24.9.1</li> </ul> </li> </ul>
<h2>References:</h2> <ul> <li> <a href="https://www.suse.com/security/cve/CVE-2023-1668.html">https://www.suse.com/security/cve/CVE-2023-1668.html</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210054">https://bugzilla.suse.com/show_bug.cgi?id=1210054</a> </li> </ul> </div>
--===============6845026981795070149==--
|
|
|
|