-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: openvswitch2.11 security update
Advisory ID:       RHSA-2021:3942-01
Product:           Red Hat Virtualization
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:3942
Issue date:        2021-10-20
CVE Names:         CVE-2021-36980 
====================================================================
1. Summary:

An update for openvswitch2.11 is now available for Red Hat Virtualization 4
for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts - ppc64le, x86_64

3. Description:

Open vSwitch provides standard network bridging functions and support for
the OpenFlow protocol for remote per-flow control of traffic.

Security Fix(es):

* openvswitch2.11: openvswitch: use-after-free in decode_NXAST_RAW_ENCAP
during the decoding of a RAW_ENCAP action (CVE-2021-36980)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/2974891

5. Bugs fixed (https://bugzilla.redhat.com/):

1984473 - CVE-2021-36980 openvswitch: use-after-free in decode_NXAST_RAW_ENCAP during the decoding of a RAW_ENCAP action

6. Package List:

Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts:

Source:
openvswitch2.11-2.11.3-89.el7fdp.src.rpm

ppc64le:
openvswitch2.11-2.11.3-89.el7fdp.ppc64le.rpm
openvswitch2.11-debuginfo-2.11.3-89.el7fdp.ppc64le.rpm
openvswitch2.11-devel-2.11.3-89.el7fdp.ppc64le.rpm
python-openvswitch2.11-2.11.3-89.el7fdp.ppc64le.rpm

x86_64:
openvswitch2.11-2.11.3-89.el7fdp.x86_64.rpm
openvswitch2.11-debuginfo-2.11.3-89.el7fdp.x86_64.rpm
openvswitch2.11-devel-2.11.3-89.el7fdp.x86_64.rpm
python-openvswitch2.11-2.11.3-89.el7fdp.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-36980
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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k4xi
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2021-3942:01 Moderate: openvswitch2.11 security update

An update for openvswitch2.11 is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7

Summary

Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic.
Security Fix(es):
* openvswitch2.11: openvswitch: use-after-free in decode_NXAST_RAW_ENCAP during the decoding of a RAW_ENCAP action (CVE-2021-36980)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/2974891

References

https://access.redhat.com/security/cve/CVE-2021-36980 https://access.redhat.com/security/updates/classification/#moderate

Package List

Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts:
Source: openvswitch2.11-2.11.3-89.el7fdp.src.rpm
ppc64le: openvswitch2.11-2.11.3-89.el7fdp.ppc64le.rpm openvswitch2.11-debuginfo-2.11.3-89.el7fdp.ppc64le.rpm openvswitch2.11-devel-2.11.3-89.el7fdp.ppc64le.rpm python-openvswitch2.11-2.11.3-89.el7fdp.ppc64le.rpm
x86_64: openvswitch2.11-2.11.3-89.el7fdp.x86_64.rpm openvswitch2.11-debuginfo-2.11.3-89.el7fdp.x86_64.rpm openvswitch2.11-devel-2.11.3-89.el7fdp.x86_64.rpm python-openvswitch2.11-2.11.3-89.el7fdp.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2021:3942-01
Product: Red Hat Virtualization
Advisory URL: https://access.redhat.com/errata/RHSA-2021:3942
Issued Date: : 2021-10-20
CVE Names: CVE-2021-36980

Topic

An update for openvswitch2.11 is now available for Red Hat Virtualization 4for Red Hat Enterprise Linux 7.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts - ppc64le, x86_64


Bugs Fixed

1984473 - CVE-2021-36980 openvswitch: use-after-free in decode_NXAST_RAW_ENCAP during the decoding of a RAW_ENCAP action


Related News