Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2024-2182
Vulnerability from cvelistv5
Published
2024-03-12 16:18
Modified
2024-11-15 15:29
Severity ?
EPSS score ?
Summary
A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ |
Version: 20.03.0 ≤ |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-2182", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-13T14:24:40.610508Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:22:21.535Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T19:03:39.232Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/03/12/5" }, { "name": "RHSA-2024:1385", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:1385" }, { "name": "RHSA-2024:1386", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:1386" }, { "name": "RHSA-2024:1387", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:1387" }, { "name": "RHSA-2024:1388", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:1388" }, { "name": "RHSA-2024:1390", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:1390" }, { "name": "RHSA-2024:1391", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:1391" }, { "name": "RHSA-2024:1392", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:1392" }, { "name": "RHSA-2024:1393", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:1393" }, { "name": "RHSA-2024:1394", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:1394" }, { "name": "RHSA-2024:4035", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:4035" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2024-2182" }, { "name": "RHBZ#2267840", "tags": [ "issue-tracking", "x_refsource_REDHAT", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APR4GCVCMQD3DQUKXDNGIXCCYGE5V7IT/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CB4N522FCS4XWAPUKRWZF6QZ657FCIDF/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRKXOOOKD56TY3JQVB45N3GCTX3EG4BV/" }, { "tags": [ "x_transferred" ], "url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html" }, { "tags": [ "x_transferred" ], "url": "https://www.openwall.com/lists/oss-security/2024/03/12/5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://www.github.com/ovn-org/ovn/", "defaultStatus": "unaffected", "packageName": "ovn", "versions": [ { "lessThan": "*", "status": "affected", "version": "20.03.0", "versionType": "semver" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ], "defaultStatus": "affected", "packageName": "ovn23.06", "product": "Fast Datapath for Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:23.06.1-112.el8fdp", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ], "defaultStatus": "affected", "packageName": "ovn22.12", "product": "Fast Datapath for Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:22.12.1-94.el8fdp", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ], "defaultStatus": "affected", "packageName": "ovn22.03", "product": "Fast Datapath for Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:22.03.3-71.el8fdp", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ], "defaultStatus": "affected", "packageName": "ovn23.03", "product": "Fast Datapath for Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:23.03.1-100.el8fdp", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ], "defaultStatus": "affected", "packageName": "ovn-2021", "product": "Fast Datapath for Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:21.12.0-142.el8fdp", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:9::fastdatapath" ], "defaultStatus": "affected", "packageName": "ovn23.09", "product": "Fast Datapath for Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:23.09.0-136.el9fdp", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:9::fastdatapath" ], "defaultStatus": "affected", "packageName": "ovn23.06", "product": "Fast Datapath for Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:23.06.1-112.el9fdp", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:9::fastdatapath" ], "defaultStatus": "affected", "packageName": "ovn22.12", "product": "Fast Datapath for Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:22.12.1-94.el9fdp", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:9::fastdatapath" ], "defaultStatus": "affected", "packageName": "ovn22.03", "product": "Fast Datapath for Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:22.03.3-71.el9fdp", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:9::fastdatapath" ], "defaultStatus": "affected", "packageName": "ovn23.03", "product": "Fast Datapath for Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:23.03.1-100.el9fdp", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:7::fastdatapath" ], "defaultStatus": "unknown", "packageName": "ovn2.11", "product": "Fast Datapath for RHEL 7", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:7::fastdatapath" ], "defaultStatus": "unknown", "packageName": "ovn2.12", "product": "Fast Datapath for RHEL 7", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:7::fastdatapath" ], "defaultStatus": "unknown", "packageName": "ovn2.13", "product": "Fast Datapath for RHEL 7", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ], "defaultStatus": "unknown", "packageName": "ovn2.11", "product": "Fast Datapath for RHEL 8", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ], "defaultStatus": "unknown", "packageName": "ovn2.12", "product": "Fast Datapath for RHEL 8", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ], "defaultStatus": "unknown", "packageName": "ovn2.13", "product": "Fast Datapath for RHEL 8", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ], "defaultStatus": "unknown", "packageName": "ovn22.06", "product": "Fast Datapath for RHEL 8", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ], "defaultStatus": "unknown", "packageName": "ovn22.09", "product": "Fast Datapath for RHEL 8", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:9::fastdatapath" ], "defaultStatus": "affected", "packageName": "ovn-2021", "product": "Fast Datapath for RHEL 9", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:9::fastdatapath" ], "defaultStatus": "unknown", "packageName": "ovn22.06", "product": "Fast Datapath for RHEL 9", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:9::fastdatapath" ], "defaultStatus": "unknown", "packageName": "ovn22.09", "product": "Fast Datapath for RHEL 9", "vendor": "Red Hat" } ], "credits": [ { "lang": "en", "value": "Red Hat would like to thank Frode Nordahl (Canonical) for reporting this issue." } ], "datePublic": "2024-03-12T00:00:00+00:00", "descriptions": [ { "lang": "en", "value": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service." } ], "metrics": [ { "other": { "content": { "namespace": "https://access.redhat.com/security/updates/classification/", "value": "Moderate" }, "type": "Red Hat severity rating" } }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-346", "description": "Origin Validation Error", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:29:03.042Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2024:1385", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:1385" }, { "name": "RHSA-2024:1386", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:1386" }, { "name": "RHSA-2024:1387", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:1387" }, { "name": "RHSA-2024:1388", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:1388" }, { "name": "RHSA-2024:1390", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:1390" }, { "name": "RHSA-2024:1391", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:1391" }, { "name": "RHSA-2024:1392", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:1392" }, { "name": "RHSA-2024:1393", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:1393" }, { "name": "RHSA-2024:1394", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:1394" }, { "name": "RHSA-2024:4035", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:4035" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/cve/CVE-2024-2182" }, { "name": "RHBZ#2267840", "tags": [ "issue-tracking", "x_refsource_REDHAT" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840" }, { "url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html" }, { "url": "https://www.openwall.com/lists/oss-security/2024/03/12/5" } ], "timeline": [ { "lang": "en", "time": "2024-03-04T00:00:00+00:00", "value": "Reported to Red Hat." }, { "lang": "en", "time": "2024-03-12T00:00:00+00:00", "value": "Made public." } ], "title": "Ovn: insufficient validation of bfd packets may lead to denial of service", "x_redhatCweChain": "CWE-346: Origin Validation Error" } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2024-2182", "datePublished": "2024-03-12T16:18:31.829Z", "dateReserved": "2024-03-05T00:40:55.429Z", "dateUpdated": "2024-11-15T15:29:03.042Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-2182\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2024-03-12T17:15:59.190\",\"lastModified\":\"2024-11-21T09:09:12.320\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 una falla en la Red Virtual Abierta (OVN). En los cl\u00fasteres OVN donde se utiliza BFD entre hipervisores para alta disponibilidad, un atacante puede inyectar paquetes BFD especialmente manipulados desde cargas de trabajo sin privilegios, incluidas m\u00e1quinas virtuales o contenedores, que pueden desencadenar una denegaci\u00f3n de servicio.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-346\"}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1385\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1386\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1387\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1388\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1390\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1391\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1392\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1393\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1394\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:4035\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2024-2182\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2267840\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.openwall.com/lists/oss-security/2024/03/12/5\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/03/12/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1385\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1386\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1387\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1388\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1390\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1391\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1392\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1393\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1394\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:4035\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2024-2182\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2267840\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APR4GCVCMQD3DQUKXDNGIXCCYGE5V7IT/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CB4N522FCS4XWAPUKRWZF6QZ657FCIDF/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRKXOOOKD56TY3JQVB45N3GCTX3EG4BV/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.openwall.com/lists/oss-security/2024/03/12/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2024_1387
Vulnerability from csaf_redhat
Published
2024-03-19 15:39
Modified
2024-11-15 16:11
Summary
Red Hat Security Advisory: ovn22.03 security update
Notes
Topic
An update for ovn22.03 is now available in Fast Datapath for Red Hat
Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn22.03: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ovn22.03 is now available in Fast Datapath for Red Hat\nEnterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn22.03: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1387", "url": "https://access.redhat.com/errata/RHSA-2024:1387" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1387.json" } ], "title": "Red Hat Security Advisory: ovn22.03 security update", "tracking": { "current_release_date": "2024-11-15T16:11:23+00:00", "generator": { "date": "2024-11-15T16:11:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:1387", "initial_release_date": "2024-03-19T15:39:52+00:00", "revision_history": [ { "date": "2024-03-19T15:39:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-03-19T15:39:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T16:11:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Fast Datapath for Red Hat Enterprise Linux 8", "product": { "name": "Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::fastdatapath" } } } ], "category": "product_family", "name": "Fast Datapath" }, { "branches": [ { "category": "product_version", "name": "ovn22.03-0:22.03.3-71.el8fdp.src", "product": { "name": "ovn22.03-0:22.03.3-71.el8fdp.src", "product_id": "ovn22.03-0:22.03.3-71.el8fdp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el8fdp?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ovn22.03-0:22.03.3-71.el8fdp.x86_64", "product": { "name": "ovn22.03-0:22.03.3-71.el8fdp.x86_64", "product_id": "ovn22.03-0:22.03.3-71.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.03-central-0:22.03.3-71.el8fdp.x86_64", "product": { "name": "ovn22.03-central-0:22.03.3-71.el8fdp.x86_64", "product_id": "ovn22.03-central-0:22.03.3-71.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-central@22.03.3-71.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.03-host-0:22.03.3-71.el8fdp.x86_64", "product": { "name": "ovn22.03-host-0:22.03.3-71.el8fdp.x86_64", "product_id": "ovn22.03-host-0:22.03.3-71.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-host@22.03.3-71.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.x86_64", "product": { "name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.x86_64", "product_id": "ovn22.03-vtep-0:22.03.3-71.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.3-71.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.x86_64", "product": { "name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.x86_64", "product_id": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.3-71.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.x86_64", "product": { "name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.x86_64", "product_id": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.3-71.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.x86_64", "product": { "name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.x86_64", "product_id": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.3-71.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.x86_64", "product": { "name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.x86_64", "product_id": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.3-71.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.x86_64", "product": { "name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.x86_64", "product_id": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.3-71.el8fdp?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ovn22.03-0:22.03.3-71.el8fdp.ppc64le", "product": { "name": "ovn22.03-0:22.03.3-71.el8fdp.ppc64le", "product_id": "ovn22.03-0:22.03.3-71.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.03-central-0:22.03.3-71.el8fdp.ppc64le", "product": { "name": "ovn22.03-central-0:22.03.3-71.el8fdp.ppc64le", "product_id": "ovn22.03-central-0:22.03.3-71.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-central@22.03.3-71.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.03-host-0:22.03.3-71.el8fdp.ppc64le", "product": { "name": "ovn22.03-host-0:22.03.3-71.el8fdp.ppc64le", "product_id": "ovn22.03-host-0:22.03.3-71.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-host@22.03.3-71.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.ppc64le", "product": { "name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.ppc64le", "product_id": "ovn22.03-vtep-0:22.03.3-71.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.3-71.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.ppc64le", "product": { "name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.ppc64le", "product_id": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.3-71.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "product": { "name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "product_id": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.3-71.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "product": { "name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "product_id": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.3-71.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "product": { "name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "product_id": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.3-71.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "product": { "name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "product_id": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.3-71.el8fdp?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ovn22.03-0:22.03.3-71.el8fdp.aarch64", "product": { "name": "ovn22.03-0:22.03.3-71.el8fdp.aarch64", "product_id": "ovn22.03-0:22.03.3-71.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.03-central-0:22.03.3-71.el8fdp.aarch64", "product": { "name": "ovn22.03-central-0:22.03.3-71.el8fdp.aarch64", "product_id": "ovn22.03-central-0:22.03.3-71.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-central@22.03.3-71.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.03-host-0:22.03.3-71.el8fdp.aarch64", "product": { "name": "ovn22.03-host-0:22.03.3-71.el8fdp.aarch64", "product_id": "ovn22.03-host-0:22.03.3-71.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-host@22.03.3-71.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.aarch64", "product": { "name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.aarch64", "product_id": "ovn22.03-vtep-0:22.03.3-71.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.3-71.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.aarch64", "product": { "name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.aarch64", "product_id": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.3-71.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.aarch64", "product": { "name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.aarch64", "product_id": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.3-71.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.aarch64", "product": { "name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.aarch64", "product_id": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.3-71.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.aarch64", "product": { "name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.aarch64", "product_id": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.3-71.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.aarch64", "product": { "name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.aarch64", "product_id": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.3-71.el8fdp?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ovn22.03-0:22.03.3-71.el8fdp.s390x", "product": { "name": "ovn22.03-0:22.03.3-71.el8fdp.s390x", "product_id": "ovn22.03-0:22.03.3-71.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.03-central-0:22.03.3-71.el8fdp.s390x", "product": { "name": "ovn22.03-central-0:22.03.3-71.el8fdp.s390x", "product_id": "ovn22.03-central-0:22.03.3-71.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-central@22.03.3-71.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.03-host-0:22.03.3-71.el8fdp.s390x", "product": { "name": "ovn22.03-host-0:22.03.3-71.el8fdp.s390x", "product_id": "ovn22.03-host-0:22.03.3-71.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-host@22.03.3-71.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.s390x", "product": { "name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.s390x", "product_id": "ovn22.03-vtep-0:22.03.3-71.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.3-71.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.s390x", "product": { "name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.s390x", "product_id": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.3-71.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.s390x", "product": { "name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.s390x", "product_id": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.3-71.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.s390x", "product": { "name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.s390x", "product_id": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.3-71.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.s390x", "product": { "name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.s390x", "product_id": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.3-71.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.s390x", "product": { "name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.s390x", "product_id": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.3-71.el8fdp?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-0:22.03.3-71.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.aarch64" }, "product_reference": "ovn22.03-0:22.03.3-71.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-0:22.03.3-71.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.ppc64le" }, "product_reference": "ovn22.03-0:22.03.3-71.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-0:22.03.3-71.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.s390x" }, "product_reference": "ovn22.03-0:22.03.3-71.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-0:22.03.3-71.el8fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.src" }, "product_reference": "ovn22.03-0:22.03.3-71.el8fdp.src", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-0:22.03.3-71.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.x86_64" }, "product_reference": "ovn22.03-0:22.03.3-71.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-central-0:22.03.3-71.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.aarch64" }, "product_reference": "ovn22.03-central-0:22.03.3-71.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-central-0:22.03.3-71.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.ppc64le" }, "product_reference": "ovn22.03-central-0:22.03.3-71.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-central-0:22.03.3-71.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.s390x" }, "product_reference": "ovn22.03-central-0:22.03.3-71.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-central-0:22.03.3-71.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.x86_64" }, "product_reference": "ovn22.03-central-0:22.03.3-71.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.aarch64" }, "product_reference": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.ppc64le" }, "product_reference": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.s390x" }, "product_reference": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.x86_64" }, "product_reference": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.aarch64" }, "product_reference": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.ppc64le" }, "product_reference": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.s390x" }, "product_reference": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.x86_64" }, "product_reference": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.aarch64" }, "product_reference": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.ppc64le" }, "product_reference": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.s390x" }, "product_reference": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.x86_64" }, "product_reference": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-host-0:22.03.3-71.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.aarch64" }, "product_reference": "ovn22.03-host-0:22.03.3-71.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-host-0:22.03.3-71.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.ppc64le" }, "product_reference": "ovn22.03-host-0:22.03.3-71.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-host-0:22.03.3-71.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.s390x" }, "product_reference": "ovn22.03-host-0:22.03.3-71.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-host-0:22.03.3-71.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.x86_64" }, "product_reference": "ovn22.03-host-0:22.03.3-71.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.aarch64" }, "product_reference": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.ppc64le" }, "product_reference": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.s390x" }, "product_reference": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.x86_64" }, "product_reference": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.aarch64" }, "product_reference": "ovn22.03-vtep-0:22.03.3-71.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.ppc64le" }, "product_reference": "ovn22.03-vtep-0:22.03.3-71.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.s390x" }, "product_reference": "ovn22.03-vtep-0:22.03.3-71.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.x86_64" }, "product_reference": "ovn22.03-vtep-0:22.03.3-71.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.aarch64" }, "product_reference": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.ppc64le" }, "product_reference": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.s390x" }, "product_reference": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.x86_64" }, "product_reference": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Frode Nordahl" ], "organization": "Canonical" } ], "cve": "CVE-2024-2182", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2024-03-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2267840" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "ovn: insufficient validation of BFD packets may lead to denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.src", "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-2182" }, { "category": "external", "summary": "RHBZ#2267840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2182" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182" }, { "category": "external", "summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html", "url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5", "url": "https://www.openwall.com/lists/oss-security/2024/03/12/5" } ], "release_date": "2024-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-03-19T15:39:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.src", "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1387" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.src", "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ovn: insufficient validation of BFD packets may lead to denial of service" } ] }
rhsa-2024_1392
Vulnerability from csaf_redhat
Published
2024-03-19 15:46
Modified
2024-11-15 16:10
Summary
Red Hat Security Advisory: ovn22.12 security update
Notes
Topic
An update for ovn22.12 is now available in Fast Datapath for Red Hat
Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn22.12: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ovn22.12 is now available in Fast Datapath for Red Hat\nEnterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn22.12: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1392", "url": "https://access.redhat.com/errata/RHSA-2024:1392" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1392.json" } ], "title": "Red Hat Security Advisory: ovn22.12 security update", "tracking": { "current_release_date": "2024-11-15T16:10:48+00:00", "generator": { "date": "2024-11-15T16:10:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:1392", "initial_release_date": "2024-03-19T15:46:20+00:00", "revision_history": [ { "date": "2024-03-19T15:46:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-03-19T15:46:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T16:10:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Fast Datapath for Red Hat Enterprise Linux 9", "product": { "name": "Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:9::fastdatapath" } } } ], "category": "product_family", "name": "Fast Datapath" }, { "branches": [ { "category": "product_version", "name": "ovn22.12-0:22.12.1-94.el9fdp.src", "product": { "name": "ovn22.12-0:22.12.1-94.el9fdp.src", "product_id": "ovn22.12-0:22.12.1-94.el9fdp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el9fdp?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ovn22.12-0:22.12.1-94.el9fdp.x86_64", "product": { "name": "ovn22.12-0:22.12.1-94.el9fdp.x86_64", "product_id": "ovn22.12-0:22.12.1-94.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.12-central-0:22.12.1-94.el9fdp.x86_64", "product": { "name": "ovn22.12-central-0:22.12.1-94.el9fdp.x86_64", "product_id": "ovn22.12-central-0:22.12.1-94.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-central@22.12.1-94.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.12-host-0:22.12.1-94.el9fdp.x86_64", "product": { "name": "ovn22.12-host-0:22.12.1-94.el9fdp.x86_64", "product_id": "ovn22.12-host-0:22.12.1-94.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-host@22.12.1-94.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.x86_64", "product": { "name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.x86_64", "product_id": "ovn22.12-vtep-0:22.12.1-94.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-vtep@22.12.1-94.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.x86_64", "product": { "name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.x86_64", "product_id": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-debugsource@22.12.1-94.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.x86_64", "product": { "name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.x86_64", "product_id": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-central-debuginfo@22.12.1-94.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.x86_64", "product": { "name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.x86_64", "product_id": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-debuginfo@22.12.1-94.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.x86_64", "product": { "name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.x86_64", "product_id": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-host-debuginfo@22.12.1-94.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.x86_64", "product": { "name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.x86_64", "product_id": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-vtep-debuginfo@22.12.1-94.el9fdp?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ovn22.12-0:22.12.1-94.el9fdp.ppc64le", "product": { "name": "ovn22.12-0:22.12.1-94.el9fdp.ppc64le", "product_id": "ovn22.12-0:22.12.1-94.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.12-central-0:22.12.1-94.el9fdp.ppc64le", "product": { "name": "ovn22.12-central-0:22.12.1-94.el9fdp.ppc64le", "product_id": "ovn22.12-central-0:22.12.1-94.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-central@22.12.1-94.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.12-host-0:22.12.1-94.el9fdp.ppc64le", "product": { "name": "ovn22.12-host-0:22.12.1-94.el9fdp.ppc64le", "product_id": "ovn22.12-host-0:22.12.1-94.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-host@22.12.1-94.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.ppc64le", "product": { "name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.ppc64le", "product_id": "ovn22.12-vtep-0:22.12.1-94.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-vtep@22.12.1-94.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.ppc64le", "product": { "name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.ppc64le", "product_id": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-debugsource@22.12.1-94.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "product": { "name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "product_id": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-central-debuginfo@22.12.1-94.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "product": { "name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "product_id": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-debuginfo@22.12.1-94.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "product": { "name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "product_id": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-host-debuginfo@22.12.1-94.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "product": { "name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "product_id": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-vtep-debuginfo@22.12.1-94.el9fdp?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ovn22.12-0:22.12.1-94.el9fdp.aarch64", "product": { "name": "ovn22.12-0:22.12.1-94.el9fdp.aarch64", "product_id": "ovn22.12-0:22.12.1-94.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.12-central-0:22.12.1-94.el9fdp.aarch64", "product": { "name": "ovn22.12-central-0:22.12.1-94.el9fdp.aarch64", "product_id": "ovn22.12-central-0:22.12.1-94.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-central@22.12.1-94.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.12-host-0:22.12.1-94.el9fdp.aarch64", "product": { "name": "ovn22.12-host-0:22.12.1-94.el9fdp.aarch64", "product_id": "ovn22.12-host-0:22.12.1-94.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-host@22.12.1-94.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.aarch64", "product": { "name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.aarch64", "product_id": "ovn22.12-vtep-0:22.12.1-94.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-vtep@22.12.1-94.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.aarch64", "product": { "name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.aarch64", "product_id": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-debugsource@22.12.1-94.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.aarch64", "product": { "name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.aarch64", "product_id": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-central-debuginfo@22.12.1-94.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.aarch64", "product": { "name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.aarch64", "product_id": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-debuginfo@22.12.1-94.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.aarch64", "product": { "name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.aarch64", "product_id": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-host-debuginfo@22.12.1-94.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.aarch64", "product": { "name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.aarch64", "product_id": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-vtep-debuginfo@22.12.1-94.el9fdp?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ovn22.12-0:22.12.1-94.el9fdp.s390x", "product": { "name": "ovn22.12-0:22.12.1-94.el9fdp.s390x", "product_id": "ovn22.12-0:22.12.1-94.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.12-central-0:22.12.1-94.el9fdp.s390x", "product": { "name": "ovn22.12-central-0:22.12.1-94.el9fdp.s390x", "product_id": "ovn22.12-central-0:22.12.1-94.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-central@22.12.1-94.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.12-host-0:22.12.1-94.el9fdp.s390x", "product": { "name": "ovn22.12-host-0:22.12.1-94.el9fdp.s390x", "product_id": "ovn22.12-host-0:22.12.1-94.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-host@22.12.1-94.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.s390x", "product": { "name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.s390x", "product_id": "ovn22.12-vtep-0:22.12.1-94.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-vtep@22.12.1-94.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.s390x", "product": { "name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.s390x", "product_id": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-debugsource@22.12.1-94.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.s390x", "product": { "name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.s390x", "product_id": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-central-debuginfo@22.12.1-94.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.s390x", "product": { "name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.s390x", "product_id": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-debuginfo@22.12.1-94.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.s390x", "product": { "name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.s390x", "product_id": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-host-debuginfo@22.12.1-94.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.s390x", "product": { "name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.s390x", "product_id": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-vtep-debuginfo@22.12.1-94.el9fdp?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-0:22.12.1-94.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.aarch64" }, "product_reference": "ovn22.12-0:22.12.1-94.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-0:22.12.1-94.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.ppc64le" }, "product_reference": "ovn22.12-0:22.12.1-94.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-0:22.12.1-94.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.s390x" }, "product_reference": "ovn22.12-0:22.12.1-94.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-0:22.12.1-94.el9fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.src" }, "product_reference": "ovn22.12-0:22.12.1-94.el9fdp.src", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-0:22.12.1-94.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.x86_64" }, "product_reference": "ovn22.12-0:22.12.1-94.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-central-0:22.12.1-94.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.aarch64" }, "product_reference": "ovn22.12-central-0:22.12.1-94.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-central-0:22.12.1-94.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.ppc64le" }, "product_reference": "ovn22.12-central-0:22.12.1-94.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-central-0:22.12.1-94.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.s390x" }, "product_reference": "ovn22.12-central-0:22.12.1-94.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-central-0:22.12.1-94.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.x86_64" }, "product_reference": "ovn22.12-central-0:22.12.1-94.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.aarch64" }, "product_reference": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.ppc64le" }, "product_reference": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.s390x" }, "product_reference": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.x86_64" }, "product_reference": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.aarch64" }, "product_reference": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.ppc64le" }, "product_reference": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.s390x" }, "product_reference": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.x86_64" }, "product_reference": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.aarch64" }, "product_reference": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.ppc64le" }, "product_reference": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.s390x" }, "product_reference": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.x86_64" }, "product_reference": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-host-0:22.12.1-94.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.aarch64" }, "product_reference": "ovn22.12-host-0:22.12.1-94.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-host-0:22.12.1-94.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.ppc64le" }, "product_reference": "ovn22.12-host-0:22.12.1-94.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-host-0:22.12.1-94.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.s390x" }, "product_reference": "ovn22.12-host-0:22.12.1-94.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-host-0:22.12.1-94.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.x86_64" }, "product_reference": "ovn22.12-host-0:22.12.1-94.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.aarch64" }, "product_reference": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.ppc64le" }, "product_reference": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.s390x" }, "product_reference": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.x86_64" }, "product_reference": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.aarch64" }, "product_reference": "ovn22.12-vtep-0:22.12.1-94.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.ppc64le" }, "product_reference": "ovn22.12-vtep-0:22.12.1-94.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.s390x" }, "product_reference": "ovn22.12-vtep-0:22.12.1-94.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.x86_64" }, "product_reference": "ovn22.12-vtep-0:22.12.1-94.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.aarch64" }, "product_reference": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.ppc64le" }, "product_reference": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.s390x" }, "product_reference": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.x86_64" }, "product_reference": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Frode Nordahl" ], "organization": "Canonical" } ], "cve": "CVE-2024-2182", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2024-03-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2267840" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "ovn: insufficient validation of BFD packets may lead to denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.src", "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-2182" }, { "category": "external", "summary": "RHBZ#2267840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2182" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182" }, { "category": "external", "summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html", "url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5", "url": "https://www.openwall.com/lists/oss-security/2024/03/12/5" } ], "release_date": "2024-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-03-19T15:46:20+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.src", "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1392" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.src", "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ovn: insufficient validation of BFD packets may lead to denial of service" } ] }
rhsa-2024_4035
Vulnerability from csaf_redhat
Published
2024-06-20 16:25
Modified
2024-11-15 16:17
Summary
Red Hat Security Advisory: ovn-2021 security update
Notes
Topic
An update for ovn-2021 is now available in Fast Datapath for Red Hat
Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn-2021: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ovn-2021 is now available in Fast Datapath for Red Hat\nEnterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn-2021: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4035", "url": "https://access.redhat.com/errata/RHSA-2024:4035" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2267840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4035.json" } ], "title": "Red Hat Security Advisory: ovn-2021 security update", "tracking": { "current_release_date": "2024-11-15T16:17:06+00:00", "generator": { "date": "2024-11-15T16:17:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:4035", "initial_release_date": "2024-06-20T16:25:16+00:00", "revision_history": [ { "date": "2024-06-20T16:25:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-06-20T16:25:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T16:17:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Fast Datapath for Red Hat Enterprise Linux 8", "product": { "name": "Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::fastdatapath" } } } ], "category": "product_family", "name": "Fast Datapath" }, { "branches": [ { "category": "product_version", "name": "ovn-2021-0:21.12.0-142.el8fdp.src", "product": { "name": "ovn-2021-0:21.12.0-142.el8fdp.src", "product_id": "ovn-2021-0:21.12.0-142.el8fdp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021@21.12.0-142.el8fdp?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ovn-2021-0:21.12.0-142.el8fdp.x86_64", "product": { "name": "ovn-2021-0:21.12.0-142.el8fdp.x86_64", "product_id": "ovn-2021-0:21.12.0-142.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021@21.12.0-142.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn-2021-central-0:21.12.0-142.el8fdp.x86_64", "product": { "name": "ovn-2021-central-0:21.12.0-142.el8fdp.x86_64", "product_id": "ovn-2021-central-0:21.12.0-142.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-central@21.12.0-142.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn-2021-host-0:21.12.0-142.el8fdp.x86_64", "product": { "name": "ovn-2021-host-0:21.12.0-142.el8fdp.x86_64", "product_id": "ovn-2021-host-0:21.12.0-142.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-host@21.12.0-142.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.x86_64", "product": { "name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.x86_64", "product_id": "ovn-2021-vtep-0:21.12.0-142.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-vtep@21.12.0-142.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.x86_64", "product": { "name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.x86_64", "product_id": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-debugsource@21.12.0-142.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.x86_64", "product": { "name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.x86_64", "product_id": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-central-debuginfo@21.12.0-142.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.x86_64", "product": { "name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.x86_64", "product_id": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-debuginfo@21.12.0-142.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.x86_64", "product": { "name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.x86_64", "product_id": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-host-debuginfo@21.12.0-142.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.x86_64", "product": { "name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.x86_64", "product_id": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-vtep-debuginfo@21.12.0-142.el8fdp?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ovn-2021-0:21.12.0-142.el8fdp.ppc64le", "product": { "name": "ovn-2021-0:21.12.0-142.el8fdp.ppc64le", "product_id": "ovn-2021-0:21.12.0-142.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021@21.12.0-142.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn-2021-central-0:21.12.0-142.el8fdp.ppc64le", "product": { "name": "ovn-2021-central-0:21.12.0-142.el8fdp.ppc64le", "product_id": "ovn-2021-central-0:21.12.0-142.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-central@21.12.0-142.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn-2021-host-0:21.12.0-142.el8fdp.ppc64le", "product": { "name": "ovn-2021-host-0:21.12.0-142.el8fdp.ppc64le", "product_id": "ovn-2021-host-0:21.12.0-142.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-host@21.12.0-142.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.ppc64le", "product": { "name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.ppc64le", "product_id": "ovn-2021-vtep-0:21.12.0-142.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-vtep@21.12.0-142.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.ppc64le", "product": { "name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.ppc64le", "product_id": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-debugsource@21.12.0-142.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "product": { "name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "product_id": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-central-debuginfo@21.12.0-142.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "product": { "name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "product_id": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-debuginfo@21.12.0-142.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "product": { "name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "product_id": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-host-debuginfo@21.12.0-142.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "product": { "name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "product_id": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-vtep-debuginfo@21.12.0-142.el8fdp?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ovn-2021-0:21.12.0-142.el8fdp.aarch64", "product": { "name": "ovn-2021-0:21.12.0-142.el8fdp.aarch64", "product_id": "ovn-2021-0:21.12.0-142.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021@21.12.0-142.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn-2021-central-0:21.12.0-142.el8fdp.aarch64", "product": { "name": "ovn-2021-central-0:21.12.0-142.el8fdp.aarch64", "product_id": "ovn-2021-central-0:21.12.0-142.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-central@21.12.0-142.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn-2021-host-0:21.12.0-142.el8fdp.aarch64", "product": { "name": "ovn-2021-host-0:21.12.0-142.el8fdp.aarch64", "product_id": "ovn-2021-host-0:21.12.0-142.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-host@21.12.0-142.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.aarch64", "product": { "name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.aarch64", "product_id": "ovn-2021-vtep-0:21.12.0-142.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-vtep@21.12.0-142.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.aarch64", "product": { "name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.aarch64", "product_id": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-debugsource@21.12.0-142.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.aarch64", "product": { "name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.aarch64", "product_id": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-central-debuginfo@21.12.0-142.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.aarch64", "product": { "name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.aarch64", "product_id": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-debuginfo@21.12.0-142.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.aarch64", "product": { "name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.aarch64", "product_id": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-host-debuginfo@21.12.0-142.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.aarch64", "product": { "name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.aarch64", "product_id": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-vtep-debuginfo@21.12.0-142.el8fdp?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ovn-2021-0:21.12.0-142.el8fdp.s390x", "product": { "name": "ovn-2021-0:21.12.0-142.el8fdp.s390x", "product_id": "ovn-2021-0:21.12.0-142.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021@21.12.0-142.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn-2021-central-0:21.12.0-142.el8fdp.s390x", "product": { "name": "ovn-2021-central-0:21.12.0-142.el8fdp.s390x", "product_id": "ovn-2021-central-0:21.12.0-142.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-central@21.12.0-142.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn-2021-host-0:21.12.0-142.el8fdp.s390x", "product": { "name": "ovn-2021-host-0:21.12.0-142.el8fdp.s390x", "product_id": "ovn-2021-host-0:21.12.0-142.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-host@21.12.0-142.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.s390x", "product": { "name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.s390x", "product_id": "ovn-2021-vtep-0:21.12.0-142.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-vtep@21.12.0-142.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.s390x", "product": { "name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.s390x", "product_id": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-debugsource@21.12.0-142.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.s390x", "product": { "name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.s390x", "product_id": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-central-debuginfo@21.12.0-142.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.s390x", "product": { "name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.s390x", "product_id": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-debuginfo@21.12.0-142.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.s390x", "product": { "name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.s390x", "product_id": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-host-debuginfo@21.12.0-142.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.s390x", "product": { "name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.s390x", "product_id": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn-2021-vtep-debuginfo@21.12.0-142.el8fdp?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-0:21.12.0-142.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.aarch64" }, "product_reference": "ovn-2021-0:21.12.0-142.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-0:21.12.0-142.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.ppc64le" }, "product_reference": "ovn-2021-0:21.12.0-142.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-0:21.12.0-142.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.s390x" }, "product_reference": "ovn-2021-0:21.12.0-142.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-0:21.12.0-142.el8fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.src" }, "product_reference": "ovn-2021-0:21.12.0-142.el8fdp.src", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-0:21.12.0-142.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.x86_64" }, "product_reference": "ovn-2021-0:21.12.0-142.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-central-0:21.12.0-142.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.aarch64" }, "product_reference": "ovn-2021-central-0:21.12.0-142.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-central-0:21.12.0-142.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.ppc64le" }, "product_reference": "ovn-2021-central-0:21.12.0-142.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-central-0:21.12.0-142.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.s390x" }, "product_reference": "ovn-2021-central-0:21.12.0-142.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-central-0:21.12.0-142.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.x86_64" }, "product_reference": "ovn-2021-central-0:21.12.0-142.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.aarch64" }, "product_reference": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.ppc64le" }, "product_reference": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.s390x" }, "product_reference": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.x86_64" }, "product_reference": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.aarch64" }, "product_reference": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.ppc64le" }, "product_reference": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.s390x" }, "product_reference": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.x86_64" }, "product_reference": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.aarch64" }, "product_reference": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.ppc64le" }, "product_reference": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.s390x" }, "product_reference": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.x86_64" }, "product_reference": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-host-0:21.12.0-142.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.aarch64" }, "product_reference": "ovn-2021-host-0:21.12.0-142.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-host-0:21.12.0-142.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.ppc64le" }, "product_reference": "ovn-2021-host-0:21.12.0-142.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-host-0:21.12.0-142.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.s390x" }, "product_reference": "ovn-2021-host-0:21.12.0-142.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-host-0:21.12.0-142.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.x86_64" }, "product_reference": "ovn-2021-host-0:21.12.0-142.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.aarch64" }, "product_reference": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.ppc64le" }, "product_reference": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.s390x" }, "product_reference": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.x86_64" }, "product_reference": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.aarch64" }, "product_reference": "ovn-2021-vtep-0:21.12.0-142.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.ppc64le" }, "product_reference": "ovn-2021-vtep-0:21.12.0-142.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.s390x" }, "product_reference": "ovn-2021-vtep-0:21.12.0-142.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.x86_64" }, "product_reference": "ovn-2021-vtep-0:21.12.0-142.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.aarch64" }, "product_reference": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.ppc64le" }, "product_reference": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.s390x" }, "product_reference": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.x86_64" }, "product_reference": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Frode Nordahl" ], "organization": "Canonical" } ], "cve": "CVE-2024-2182", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2024-03-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2267840" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "ovn: insufficient validation of BFD packets may lead to denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.aarch64", "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.s390x", "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.src", "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.x86_64", "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.aarch64", "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.s390x", "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.x86_64", "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.aarch64", "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.s390x", "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.x86_64", "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.aarch64", "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.s390x", "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.x86_64", "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.aarch64", "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.s390x", "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.x86_64", "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.aarch64", "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.s390x", "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.x86_64", "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.aarch64", "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.s390x", "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.x86_64", "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.aarch64", "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.s390x", "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.x86_64", "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.aarch64", "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.s390x", "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-2182" }, { "category": "external", "summary": "RHBZ#2267840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2182" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182" }, { "category": "external", "summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html", "url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5", "url": "https://www.openwall.com/lists/oss-security/2024/03/12/5" } ], "release_date": "2024-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-20T16:25:16+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.aarch64", "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.s390x", "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.src", "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.x86_64", "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.aarch64", "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.s390x", "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.x86_64", "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.aarch64", "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.s390x", "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.x86_64", "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.aarch64", "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.s390x", "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.x86_64", "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.aarch64", "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.s390x", "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.x86_64", "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.aarch64", "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.s390x", "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.x86_64", "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.aarch64", "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.s390x", "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.x86_64", "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.aarch64", "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.s390x", "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.x86_64", "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.aarch64", "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.s390x", "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4035" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.aarch64", "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.s390x", "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.src", "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.x86_64", "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.aarch64", "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.s390x", "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.x86_64", "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.aarch64", "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.s390x", "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.x86_64", "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.aarch64", "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.s390x", "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.x86_64", "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.aarch64", "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.s390x", "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.x86_64", "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.aarch64", "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.s390x", "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.x86_64", "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.aarch64", "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.s390x", "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.x86_64", "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.aarch64", "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.s390x", "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.x86_64", "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.aarch64", "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.s390x", "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ovn: insufficient validation of BFD packets may lead to denial of service" } ] }
rhsa-2024_1386
Vulnerability from csaf_redhat
Published
2024-03-19 15:40
Modified
2024-11-15 16:11
Summary
Red Hat Security Advisory: ovn22.12 security update
Notes
Topic
An update for ovn22.12 is now available in Fast Datapath for Red Hat
Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn22.12: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ovn22.12 is now available in Fast Datapath for Red Hat\nEnterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn22.12: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1386", "url": "https://access.redhat.com/errata/RHSA-2024:1386" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1386.json" } ], "title": "Red Hat Security Advisory: ovn22.12 security update", "tracking": { "current_release_date": "2024-11-15T16:11:02+00:00", "generator": { "date": "2024-11-15T16:11:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:1386", "initial_release_date": "2024-03-19T15:40:13+00:00", "revision_history": [ { "date": "2024-03-19T15:40:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-03-19T15:40:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T16:11:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Fast Datapath for Red Hat Enterprise Linux 8", "product": { "name": "Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::fastdatapath" } } } ], "category": "product_family", "name": "Fast Datapath" }, { "branches": [ { "category": "product_version", "name": "ovn22.12-0:22.12.1-94.el8fdp.src", "product": { "name": "ovn22.12-0:22.12.1-94.el8fdp.src", "product_id": "ovn22.12-0:22.12.1-94.el8fdp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el8fdp?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ovn22.12-0:22.12.1-94.el8fdp.x86_64", "product": { "name": "ovn22.12-0:22.12.1-94.el8fdp.x86_64", "product_id": "ovn22.12-0:22.12.1-94.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.12-central-0:22.12.1-94.el8fdp.x86_64", "product": { "name": "ovn22.12-central-0:22.12.1-94.el8fdp.x86_64", "product_id": "ovn22.12-central-0:22.12.1-94.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-central@22.12.1-94.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.12-host-0:22.12.1-94.el8fdp.x86_64", "product": { "name": "ovn22.12-host-0:22.12.1-94.el8fdp.x86_64", "product_id": "ovn22.12-host-0:22.12.1-94.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-host@22.12.1-94.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.x86_64", "product": { "name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.x86_64", "product_id": "ovn22.12-vtep-0:22.12.1-94.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-vtep@22.12.1-94.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.x86_64", "product": { "name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.x86_64", "product_id": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-debugsource@22.12.1-94.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.x86_64", "product": { "name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.x86_64", "product_id": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-central-debuginfo@22.12.1-94.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.x86_64", "product": { "name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.x86_64", "product_id": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-debuginfo@22.12.1-94.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.x86_64", "product": { "name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.x86_64", "product_id": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-host-debuginfo@22.12.1-94.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.x86_64", "product": { "name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.x86_64", "product_id": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-vtep-debuginfo@22.12.1-94.el8fdp?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ovn22.12-0:22.12.1-94.el8fdp.ppc64le", "product": { "name": "ovn22.12-0:22.12.1-94.el8fdp.ppc64le", "product_id": "ovn22.12-0:22.12.1-94.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.12-central-0:22.12.1-94.el8fdp.ppc64le", "product": { "name": "ovn22.12-central-0:22.12.1-94.el8fdp.ppc64le", "product_id": "ovn22.12-central-0:22.12.1-94.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-central@22.12.1-94.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.12-host-0:22.12.1-94.el8fdp.ppc64le", "product": { "name": "ovn22.12-host-0:22.12.1-94.el8fdp.ppc64le", "product_id": "ovn22.12-host-0:22.12.1-94.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-host@22.12.1-94.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.ppc64le", "product": { "name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.ppc64le", "product_id": "ovn22.12-vtep-0:22.12.1-94.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-vtep@22.12.1-94.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.ppc64le", "product": { "name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.ppc64le", "product_id": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-debugsource@22.12.1-94.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "product": { "name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "product_id": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-central-debuginfo@22.12.1-94.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "product": { "name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "product_id": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-debuginfo@22.12.1-94.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "product": { "name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "product_id": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-host-debuginfo@22.12.1-94.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "product": { "name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "product_id": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-vtep-debuginfo@22.12.1-94.el8fdp?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ovn22.12-0:22.12.1-94.el8fdp.aarch64", "product": { "name": "ovn22.12-0:22.12.1-94.el8fdp.aarch64", "product_id": "ovn22.12-0:22.12.1-94.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.12-central-0:22.12.1-94.el8fdp.aarch64", "product": { "name": "ovn22.12-central-0:22.12.1-94.el8fdp.aarch64", "product_id": "ovn22.12-central-0:22.12.1-94.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-central@22.12.1-94.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.12-host-0:22.12.1-94.el8fdp.aarch64", "product": { "name": "ovn22.12-host-0:22.12.1-94.el8fdp.aarch64", "product_id": "ovn22.12-host-0:22.12.1-94.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-host@22.12.1-94.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.aarch64", "product": { "name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.aarch64", "product_id": "ovn22.12-vtep-0:22.12.1-94.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-vtep@22.12.1-94.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.aarch64", "product": { "name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.aarch64", "product_id": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-debugsource@22.12.1-94.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.aarch64", "product": { "name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.aarch64", "product_id": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-central-debuginfo@22.12.1-94.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.aarch64", "product": { "name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.aarch64", "product_id": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-debuginfo@22.12.1-94.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.aarch64", "product": { "name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.aarch64", "product_id": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-host-debuginfo@22.12.1-94.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.aarch64", "product": { "name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.aarch64", "product_id": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-vtep-debuginfo@22.12.1-94.el8fdp?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ovn22.12-0:22.12.1-94.el8fdp.s390x", "product": { "name": "ovn22.12-0:22.12.1-94.el8fdp.s390x", "product_id": "ovn22.12-0:22.12.1-94.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.12-central-0:22.12.1-94.el8fdp.s390x", "product": { "name": "ovn22.12-central-0:22.12.1-94.el8fdp.s390x", "product_id": "ovn22.12-central-0:22.12.1-94.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-central@22.12.1-94.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.12-host-0:22.12.1-94.el8fdp.s390x", "product": { "name": "ovn22.12-host-0:22.12.1-94.el8fdp.s390x", "product_id": "ovn22.12-host-0:22.12.1-94.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-host@22.12.1-94.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.s390x", "product": { "name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.s390x", "product_id": "ovn22.12-vtep-0:22.12.1-94.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-vtep@22.12.1-94.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.s390x", "product": { "name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.s390x", "product_id": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-debugsource@22.12.1-94.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.s390x", "product": { "name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.s390x", "product_id": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-central-debuginfo@22.12.1-94.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.s390x", "product": { "name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.s390x", "product_id": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-debuginfo@22.12.1-94.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.s390x", "product": { "name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.s390x", "product_id": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-host-debuginfo@22.12.1-94.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.s390x", "product": { "name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.s390x", "product_id": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.12-vtep-debuginfo@22.12.1-94.el8fdp?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-0:22.12.1-94.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.aarch64" }, "product_reference": "ovn22.12-0:22.12.1-94.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-0:22.12.1-94.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.ppc64le" }, "product_reference": "ovn22.12-0:22.12.1-94.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-0:22.12.1-94.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.s390x" }, "product_reference": "ovn22.12-0:22.12.1-94.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-0:22.12.1-94.el8fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.src" }, "product_reference": "ovn22.12-0:22.12.1-94.el8fdp.src", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-0:22.12.1-94.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.x86_64" }, "product_reference": "ovn22.12-0:22.12.1-94.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-central-0:22.12.1-94.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.aarch64" }, "product_reference": "ovn22.12-central-0:22.12.1-94.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-central-0:22.12.1-94.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.ppc64le" }, "product_reference": "ovn22.12-central-0:22.12.1-94.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-central-0:22.12.1-94.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.s390x" }, "product_reference": "ovn22.12-central-0:22.12.1-94.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-central-0:22.12.1-94.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.x86_64" }, "product_reference": "ovn22.12-central-0:22.12.1-94.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.aarch64" }, "product_reference": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.ppc64le" }, "product_reference": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.s390x" }, "product_reference": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.x86_64" }, "product_reference": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.aarch64" }, "product_reference": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.ppc64le" }, "product_reference": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.s390x" }, "product_reference": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.x86_64" }, "product_reference": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.aarch64" }, "product_reference": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.ppc64le" }, "product_reference": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.s390x" }, "product_reference": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.x86_64" }, "product_reference": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-host-0:22.12.1-94.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.aarch64" }, "product_reference": "ovn22.12-host-0:22.12.1-94.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-host-0:22.12.1-94.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.ppc64le" }, "product_reference": "ovn22.12-host-0:22.12.1-94.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-host-0:22.12.1-94.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.s390x" }, "product_reference": "ovn22.12-host-0:22.12.1-94.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-host-0:22.12.1-94.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.x86_64" }, "product_reference": "ovn22.12-host-0:22.12.1-94.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.aarch64" }, "product_reference": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.ppc64le" }, "product_reference": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.s390x" }, "product_reference": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.x86_64" }, "product_reference": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.aarch64" }, "product_reference": "ovn22.12-vtep-0:22.12.1-94.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.ppc64le" }, "product_reference": "ovn22.12-vtep-0:22.12.1-94.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.s390x" }, "product_reference": "ovn22.12-vtep-0:22.12.1-94.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.x86_64" }, "product_reference": "ovn22.12-vtep-0:22.12.1-94.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.aarch64" }, "product_reference": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.ppc64le" }, "product_reference": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.s390x" }, "product_reference": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.x86_64" }, "product_reference": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Frode Nordahl" ], "organization": "Canonical" } ], "cve": "CVE-2024-2182", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2024-03-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2267840" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "ovn: insufficient validation of BFD packets may lead to denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.src", "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-2182" }, { "category": "external", "summary": "RHBZ#2267840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2182" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182" }, { "category": "external", "summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html", "url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5", "url": "https://www.openwall.com/lists/oss-security/2024/03/12/5" } ], "release_date": "2024-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-03-19T15:40:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.src", "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1386" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.src", "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.x86_64", "8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.aarch64", "8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.s390x", "8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ovn: insufficient validation of BFD packets may lead to denial of service" } ] }
rhsa-2024_1391
Vulnerability from csaf_redhat
Published
2024-03-19 15:46
Modified
2024-11-15 16:11
Summary
Red Hat Security Advisory: ovn23.06 security update
Notes
Topic
An update for ovn23.06 is now available in Fast Datapath for Red Hat
Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn23.06: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ovn23.06 is now available in Fast Datapath for Red Hat\nEnterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn23.06: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1391", "url": "https://access.redhat.com/errata/RHSA-2024:1391" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1391.json" } ], "title": "Red Hat Security Advisory: ovn23.06 security update", "tracking": { "current_release_date": "2024-11-15T16:11:12+00:00", "generator": { "date": "2024-11-15T16:11:12+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:1391", "initial_release_date": "2024-03-19T15:46:15+00:00", "revision_history": [ { "date": "2024-03-19T15:46:15+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-03-19T15:46:15+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T16:11:12+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Fast Datapath for Red Hat Enterprise Linux 9", "product": { "name": "Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:9::fastdatapath" } } } ], "category": "product_family", "name": "Fast Datapath" }, { "branches": [ { "category": "product_version", "name": "ovn23.06-0:23.06.1-112.el9fdp.src", "product": { "name": "ovn23.06-0:23.06.1-112.el9fdp.src", "product_id": "ovn23.06-0:23.06.1-112.el9fdp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el9fdp?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ovn23.06-0:23.06.1-112.el9fdp.x86_64", "product": { "name": "ovn23.06-0:23.06.1-112.el9fdp.x86_64", "product_id": "ovn23.06-0:23.06.1-112.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.06-central-0:23.06.1-112.el9fdp.x86_64", "product": { "name": "ovn23.06-central-0:23.06.1-112.el9fdp.x86_64", "product_id": "ovn23.06-central-0:23.06.1-112.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-central@23.06.1-112.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.06-host-0:23.06.1-112.el9fdp.x86_64", "product": { "name": "ovn23.06-host-0:23.06.1-112.el9fdp.x86_64", "product_id": "ovn23.06-host-0:23.06.1-112.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-host@23.06.1-112.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.x86_64", "product": { "name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.x86_64", "product_id": "ovn23.06-vtep-0:23.06.1-112.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.1-112.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.x86_64", "product": { "name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.x86_64", "product_id": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.1-112.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.x86_64", "product": { "name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.x86_64", "product_id": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.1-112.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.x86_64", "product": { "name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.x86_64", "product_id": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.1-112.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.x86_64", "product": { "name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.x86_64", "product_id": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.1-112.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.x86_64", "product": { "name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.x86_64", "product_id": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.1-112.el9fdp?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ovn23.06-0:23.06.1-112.el9fdp.ppc64le", "product": { "name": "ovn23.06-0:23.06.1-112.el9fdp.ppc64le", "product_id": "ovn23.06-0:23.06.1-112.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.06-central-0:23.06.1-112.el9fdp.ppc64le", "product": { "name": "ovn23.06-central-0:23.06.1-112.el9fdp.ppc64le", "product_id": "ovn23.06-central-0:23.06.1-112.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-central@23.06.1-112.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.06-host-0:23.06.1-112.el9fdp.ppc64le", "product": { "name": "ovn23.06-host-0:23.06.1-112.el9fdp.ppc64le", "product_id": "ovn23.06-host-0:23.06.1-112.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-host@23.06.1-112.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.ppc64le", "product": { "name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.ppc64le", "product_id": "ovn23.06-vtep-0:23.06.1-112.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.1-112.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.ppc64le", "product": { "name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.ppc64le", "product_id": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.1-112.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "product": { "name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "product_id": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.1-112.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "product": { "name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "product_id": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.1-112.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "product": { "name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "product_id": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.1-112.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "product": { "name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "product_id": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.1-112.el9fdp?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ovn23.06-0:23.06.1-112.el9fdp.aarch64", "product": { "name": "ovn23.06-0:23.06.1-112.el9fdp.aarch64", "product_id": "ovn23.06-0:23.06.1-112.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.06-central-0:23.06.1-112.el9fdp.aarch64", "product": { "name": "ovn23.06-central-0:23.06.1-112.el9fdp.aarch64", "product_id": "ovn23.06-central-0:23.06.1-112.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-central@23.06.1-112.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.06-host-0:23.06.1-112.el9fdp.aarch64", "product": { "name": "ovn23.06-host-0:23.06.1-112.el9fdp.aarch64", "product_id": "ovn23.06-host-0:23.06.1-112.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-host@23.06.1-112.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.aarch64", "product": { "name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.aarch64", "product_id": "ovn23.06-vtep-0:23.06.1-112.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.1-112.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.aarch64", "product": { "name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.aarch64", "product_id": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.1-112.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.aarch64", "product": { "name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.aarch64", "product_id": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.1-112.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.aarch64", "product": { "name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.aarch64", "product_id": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.1-112.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.aarch64", "product": { "name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.aarch64", "product_id": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.1-112.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.aarch64", "product": { "name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.aarch64", "product_id": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.1-112.el9fdp?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ovn23.06-0:23.06.1-112.el9fdp.s390x", "product": { "name": "ovn23.06-0:23.06.1-112.el9fdp.s390x", "product_id": "ovn23.06-0:23.06.1-112.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.06-central-0:23.06.1-112.el9fdp.s390x", "product": { "name": "ovn23.06-central-0:23.06.1-112.el9fdp.s390x", "product_id": "ovn23.06-central-0:23.06.1-112.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-central@23.06.1-112.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.06-host-0:23.06.1-112.el9fdp.s390x", "product": { "name": "ovn23.06-host-0:23.06.1-112.el9fdp.s390x", "product_id": "ovn23.06-host-0:23.06.1-112.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-host@23.06.1-112.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.s390x", "product": { "name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.s390x", "product_id": "ovn23.06-vtep-0:23.06.1-112.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.1-112.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.s390x", "product": { "name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.s390x", "product_id": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.1-112.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.s390x", "product": { "name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.s390x", "product_id": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.1-112.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.s390x", "product": { "name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.s390x", "product_id": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.1-112.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.s390x", "product": { "name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.s390x", "product_id": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.1-112.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.s390x", "product": { "name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.s390x", "product_id": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.1-112.el9fdp?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-0:23.06.1-112.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.aarch64" }, "product_reference": "ovn23.06-0:23.06.1-112.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-0:23.06.1-112.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.ppc64le" }, "product_reference": "ovn23.06-0:23.06.1-112.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-0:23.06.1-112.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.s390x" }, "product_reference": "ovn23.06-0:23.06.1-112.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-0:23.06.1-112.el9fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.src" }, "product_reference": "ovn23.06-0:23.06.1-112.el9fdp.src", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-0:23.06.1-112.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.x86_64" }, "product_reference": "ovn23.06-0:23.06.1-112.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-central-0:23.06.1-112.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.aarch64" }, "product_reference": "ovn23.06-central-0:23.06.1-112.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-central-0:23.06.1-112.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.ppc64le" }, "product_reference": "ovn23.06-central-0:23.06.1-112.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-central-0:23.06.1-112.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.s390x" }, "product_reference": "ovn23.06-central-0:23.06.1-112.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-central-0:23.06.1-112.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.x86_64" }, "product_reference": "ovn23.06-central-0:23.06.1-112.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.aarch64" }, "product_reference": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.ppc64le" }, "product_reference": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.s390x" }, "product_reference": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.x86_64" }, "product_reference": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.aarch64" }, "product_reference": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.ppc64le" }, "product_reference": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.s390x" }, "product_reference": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.x86_64" }, "product_reference": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.aarch64" }, "product_reference": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.ppc64le" }, "product_reference": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.s390x" }, "product_reference": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.x86_64" }, "product_reference": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-host-0:23.06.1-112.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.aarch64" }, "product_reference": "ovn23.06-host-0:23.06.1-112.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-host-0:23.06.1-112.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.ppc64le" }, "product_reference": "ovn23.06-host-0:23.06.1-112.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-host-0:23.06.1-112.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.s390x" }, "product_reference": "ovn23.06-host-0:23.06.1-112.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-host-0:23.06.1-112.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.x86_64" }, "product_reference": "ovn23.06-host-0:23.06.1-112.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.aarch64" }, "product_reference": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.ppc64le" }, "product_reference": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.s390x" }, "product_reference": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.x86_64" }, "product_reference": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.aarch64" }, "product_reference": "ovn23.06-vtep-0:23.06.1-112.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.ppc64le" }, "product_reference": "ovn23.06-vtep-0:23.06.1-112.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.s390x" }, "product_reference": "ovn23.06-vtep-0:23.06.1-112.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.x86_64" }, "product_reference": "ovn23.06-vtep-0:23.06.1-112.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.aarch64" }, "product_reference": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.ppc64le" }, "product_reference": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.s390x" }, "product_reference": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.x86_64" }, "product_reference": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Frode Nordahl" ], "organization": "Canonical" } ], "cve": "CVE-2024-2182", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2024-03-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2267840" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "ovn: insufficient validation of BFD packets may lead to denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.src", "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-2182" }, { "category": "external", "summary": "RHBZ#2267840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2182" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182" }, { "category": "external", "summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html", "url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5", "url": "https://www.openwall.com/lists/oss-security/2024/03/12/5" } ], "release_date": "2024-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-03-19T15:46:15+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.src", "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1391" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.src", "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ovn: insufficient validation of BFD packets may lead to denial of service" } ] }
rhsa-2024_1394
Vulnerability from csaf_redhat
Published
2024-03-19 15:46
Modified
2024-11-15 16:10
Summary
Red Hat Security Advisory: ovn23.03 security update
Notes
Topic
An update for ovn23.03 is now available in Fast Datapath for Red Hat
Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn23.03: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ovn23.03 is now available in Fast Datapath for Red Hat\nEnterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn23.03: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1394", "url": "https://access.redhat.com/errata/RHSA-2024:1394" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1394.json" } ], "title": "Red Hat Security Advisory: ovn23.03 security update", "tracking": { "current_release_date": "2024-11-15T16:10:38+00:00", "generator": { "date": "2024-11-15T16:10:38+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:1394", "initial_release_date": "2024-03-19T15:46:57+00:00", "revision_history": [ { "date": "2024-03-19T15:46:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-03-19T15:46:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T16:10:38+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Fast Datapath for Red Hat Enterprise Linux 9", "product": { "name": "Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:9::fastdatapath" } } } ], "category": "product_family", "name": "Fast Datapath" }, { "branches": [ { "category": "product_version", "name": "ovn23.03-0:23.03.1-100.el9fdp.src", "product": { "name": "ovn23.03-0:23.03.1-100.el9fdp.src", "product_id": "ovn23.03-0:23.03.1-100.el9fdp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el9fdp?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ovn23.03-0:23.03.1-100.el9fdp.x86_64", "product": { "name": "ovn23.03-0:23.03.1-100.el9fdp.x86_64", "product_id": "ovn23.03-0:23.03.1-100.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.03-central-0:23.03.1-100.el9fdp.x86_64", "product": { "name": "ovn23.03-central-0:23.03.1-100.el9fdp.x86_64", "product_id": "ovn23.03-central-0:23.03.1-100.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-central@23.03.1-100.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.03-host-0:23.03.1-100.el9fdp.x86_64", "product": { "name": "ovn23.03-host-0:23.03.1-100.el9fdp.x86_64", "product_id": "ovn23.03-host-0:23.03.1-100.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-host@23.03.1-100.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.x86_64", "product": { "name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.x86_64", "product_id": "ovn23.03-vtep-0:23.03.1-100.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-vtep@23.03.1-100.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.x86_64", "product": { "name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.x86_64", "product_id": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-debugsource@23.03.1-100.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.x86_64", "product": { "name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.x86_64", "product_id": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-central-debuginfo@23.03.1-100.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.x86_64", "product": { "name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.x86_64", "product_id": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-debuginfo@23.03.1-100.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.x86_64", "product": { "name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.x86_64", "product_id": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-host-debuginfo@23.03.1-100.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.x86_64", "product": { "name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.x86_64", "product_id": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-vtep-debuginfo@23.03.1-100.el9fdp?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ovn23.03-0:23.03.1-100.el9fdp.ppc64le", "product": { "name": "ovn23.03-0:23.03.1-100.el9fdp.ppc64le", "product_id": "ovn23.03-0:23.03.1-100.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.03-central-0:23.03.1-100.el9fdp.ppc64le", "product": { "name": "ovn23.03-central-0:23.03.1-100.el9fdp.ppc64le", "product_id": "ovn23.03-central-0:23.03.1-100.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-central@23.03.1-100.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.03-host-0:23.03.1-100.el9fdp.ppc64le", "product": { "name": "ovn23.03-host-0:23.03.1-100.el9fdp.ppc64le", "product_id": "ovn23.03-host-0:23.03.1-100.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-host@23.03.1-100.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.ppc64le", "product": { "name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.ppc64le", "product_id": "ovn23.03-vtep-0:23.03.1-100.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-vtep@23.03.1-100.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.ppc64le", "product": { "name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.ppc64le", "product_id": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-debugsource@23.03.1-100.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "product": { "name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "product_id": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-central-debuginfo@23.03.1-100.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "product": { "name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "product_id": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-debuginfo@23.03.1-100.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "product": { "name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "product_id": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-host-debuginfo@23.03.1-100.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "product": { "name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "product_id": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-vtep-debuginfo@23.03.1-100.el9fdp?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ovn23.03-0:23.03.1-100.el9fdp.aarch64", "product": { "name": "ovn23.03-0:23.03.1-100.el9fdp.aarch64", "product_id": "ovn23.03-0:23.03.1-100.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.03-central-0:23.03.1-100.el9fdp.aarch64", "product": { "name": "ovn23.03-central-0:23.03.1-100.el9fdp.aarch64", "product_id": "ovn23.03-central-0:23.03.1-100.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-central@23.03.1-100.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.03-host-0:23.03.1-100.el9fdp.aarch64", "product": { "name": "ovn23.03-host-0:23.03.1-100.el9fdp.aarch64", "product_id": "ovn23.03-host-0:23.03.1-100.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-host@23.03.1-100.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.aarch64", "product": { "name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.aarch64", "product_id": "ovn23.03-vtep-0:23.03.1-100.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-vtep@23.03.1-100.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.aarch64", "product": { "name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.aarch64", "product_id": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-debugsource@23.03.1-100.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.aarch64", "product": { "name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.aarch64", "product_id": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-central-debuginfo@23.03.1-100.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.aarch64", "product": { "name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.aarch64", "product_id": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-debuginfo@23.03.1-100.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.aarch64", "product": { "name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.aarch64", "product_id": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-host-debuginfo@23.03.1-100.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.aarch64", "product": { "name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.aarch64", "product_id": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-vtep-debuginfo@23.03.1-100.el9fdp?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ovn23.03-0:23.03.1-100.el9fdp.s390x", "product": { "name": "ovn23.03-0:23.03.1-100.el9fdp.s390x", "product_id": "ovn23.03-0:23.03.1-100.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.03-central-0:23.03.1-100.el9fdp.s390x", "product": { "name": "ovn23.03-central-0:23.03.1-100.el9fdp.s390x", "product_id": "ovn23.03-central-0:23.03.1-100.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-central@23.03.1-100.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.03-host-0:23.03.1-100.el9fdp.s390x", "product": { "name": "ovn23.03-host-0:23.03.1-100.el9fdp.s390x", "product_id": "ovn23.03-host-0:23.03.1-100.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-host@23.03.1-100.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.s390x", "product": { "name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.s390x", "product_id": "ovn23.03-vtep-0:23.03.1-100.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-vtep@23.03.1-100.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.s390x", "product": { "name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.s390x", "product_id": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-debugsource@23.03.1-100.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.s390x", "product": { "name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.s390x", "product_id": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-central-debuginfo@23.03.1-100.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.s390x", "product": { "name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.s390x", "product_id": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-debuginfo@23.03.1-100.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.s390x", "product": { "name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.s390x", "product_id": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-host-debuginfo@23.03.1-100.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.s390x", "product": { "name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.s390x", "product_id": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-vtep-debuginfo@23.03.1-100.el9fdp?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-0:23.03.1-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.aarch64" }, "product_reference": "ovn23.03-0:23.03.1-100.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-0:23.03.1-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.ppc64le" }, "product_reference": "ovn23.03-0:23.03.1-100.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-0:23.03.1-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.s390x" }, "product_reference": "ovn23.03-0:23.03.1-100.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-0:23.03.1-100.el9fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.src" }, "product_reference": "ovn23.03-0:23.03.1-100.el9fdp.src", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-0:23.03.1-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.x86_64" }, "product_reference": "ovn23.03-0:23.03.1-100.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-central-0:23.03.1-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.aarch64" }, "product_reference": "ovn23.03-central-0:23.03.1-100.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-central-0:23.03.1-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.ppc64le" }, "product_reference": "ovn23.03-central-0:23.03.1-100.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-central-0:23.03.1-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.s390x" }, "product_reference": "ovn23.03-central-0:23.03.1-100.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-central-0:23.03.1-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.x86_64" }, "product_reference": "ovn23.03-central-0:23.03.1-100.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.aarch64" }, "product_reference": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.ppc64le" }, "product_reference": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.s390x" }, "product_reference": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.x86_64" }, "product_reference": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.aarch64" }, "product_reference": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.ppc64le" }, "product_reference": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.s390x" }, "product_reference": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.x86_64" }, "product_reference": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.aarch64" }, "product_reference": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.ppc64le" }, "product_reference": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.s390x" }, "product_reference": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.x86_64" }, "product_reference": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-host-0:23.03.1-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.aarch64" }, "product_reference": "ovn23.03-host-0:23.03.1-100.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-host-0:23.03.1-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.ppc64le" }, "product_reference": "ovn23.03-host-0:23.03.1-100.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-host-0:23.03.1-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.s390x" }, "product_reference": "ovn23.03-host-0:23.03.1-100.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-host-0:23.03.1-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.x86_64" }, "product_reference": "ovn23.03-host-0:23.03.1-100.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.aarch64" }, "product_reference": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.ppc64le" }, "product_reference": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.s390x" }, "product_reference": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.x86_64" }, "product_reference": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.aarch64" }, "product_reference": "ovn23.03-vtep-0:23.03.1-100.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.ppc64le" }, "product_reference": "ovn23.03-vtep-0:23.03.1-100.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.s390x" }, "product_reference": "ovn23.03-vtep-0:23.03.1-100.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.x86_64" }, "product_reference": "ovn23.03-vtep-0:23.03.1-100.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.aarch64" }, "product_reference": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.ppc64le" }, "product_reference": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.s390x" }, "product_reference": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.x86_64" }, "product_reference": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Frode Nordahl" ], "organization": "Canonical" } ], "cve": "CVE-2024-2182", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2024-03-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2267840" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "ovn: insufficient validation of BFD packets may lead to denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.src", "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-2182" }, { "category": "external", "summary": "RHBZ#2267840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2182" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182" }, { "category": "external", "summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html", "url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5", "url": "https://www.openwall.com/lists/oss-security/2024/03/12/5" } ], "release_date": "2024-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-03-19T15:46:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.src", "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1394" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.src", "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ovn: insufficient validation of BFD packets may lead to denial of service" } ] }
rhsa-2024_1393
Vulnerability from csaf_redhat
Published
2024-03-19 15:47
Modified
2024-11-15 16:10
Summary
Red Hat Security Advisory: ovn22.03 security update
Notes
Topic
An update for ovn22.03 is now available in Fast Datapath for Red Hat
Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn22.03: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ovn22.03 is now available in Fast Datapath for Red Hat\nEnterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn22.03: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1393", "url": "https://access.redhat.com/errata/RHSA-2024:1393" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1393.json" } ], "title": "Red Hat Security Advisory: ovn22.03 security update", "tracking": { "current_release_date": "2024-11-15T16:10:24+00:00", "generator": { "date": "2024-11-15T16:10:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:1393", "initial_release_date": "2024-03-19T15:47:23+00:00", "revision_history": [ { "date": "2024-03-19T15:47:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-03-19T15:47:23+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T16:10:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Fast Datapath for Red Hat Enterprise Linux 9", "product": { "name": "Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:9::fastdatapath" } } } ], "category": "product_family", "name": "Fast Datapath" }, { "branches": [ { "category": "product_version", "name": "ovn22.03-0:22.03.3-71.el9fdp.src", "product": { "name": "ovn22.03-0:22.03.3-71.el9fdp.src", "product_id": "ovn22.03-0:22.03.3-71.el9fdp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el9fdp?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ovn22.03-0:22.03.3-71.el9fdp.x86_64", "product": { "name": "ovn22.03-0:22.03.3-71.el9fdp.x86_64", "product_id": "ovn22.03-0:22.03.3-71.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.03-central-0:22.03.3-71.el9fdp.x86_64", "product": { "name": "ovn22.03-central-0:22.03.3-71.el9fdp.x86_64", "product_id": "ovn22.03-central-0:22.03.3-71.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-central@22.03.3-71.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.03-host-0:22.03.3-71.el9fdp.x86_64", "product": { "name": "ovn22.03-host-0:22.03.3-71.el9fdp.x86_64", "product_id": "ovn22.03-host-0:22.03.3-71.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-host@22.03.3-71.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.x86_64", "product": { "name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.x86_64", "product_id": "ovn22.03-vtep-0:22.03.3-71.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.3-71.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.x86_64", "product": { "name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.x86_64", "product_id": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.3-71.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.x86_64", "product": { "name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.x86_64", "product_id": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.3-71.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.x86_64", "product": { "name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.x86_64", "product_id": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.3-71.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.x86_64", "product": { "name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.x86_64", "product_id": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.3-71.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.x86_64", "product": { "name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.x86_64", "product_id": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.3-71.el9fdp?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ovn22.03-0:22.03.3-71.el9fdp.ppc64le", "product": { "name": "ovn22.03-0:22.03.3-71.el9fdp.ppc64le", "product_id": "ovn22.03-0:22.03.3-71.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.03-central-0:22.03.3-71.el9fdp.ppc64le", "product": { "name": "ovn22.03-central-0:22.03.3-71.el9fdp.ppc64le", "product_id": "ovn22.03-central-0:22.03.3-71.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-central@22.03.3-71.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.03-host-0:22.03.3-71.el9fdp.ppc64le", "product": { "name": "ovn22.03-host-0:22.03.3-71.el9fdp.ppc64le", "product_id": "ovn22.03-host-0:22.03.3-71.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-host@22.03.3-71.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.ppc64le", "product": { "name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.ppc64le", "product_id": "ovn22.03-vtep-0:22.03.3-71.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.3-71.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.ppc64le", "product": { "name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.ppc64le", "product_id": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.3-71.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "product": { "name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "product_id": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.3-71.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "product": { "name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "product_id": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.3-71.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "product": { "name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "product_id": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.3-71.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "product": { "name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "product_id": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.3-71.el9fdp?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ovn22.03-0:22.03.3-71.el9fdp.aarch64", "product": { "name": "ovn22.03-0:22.03.3-71.el9fdp.aarch64", "product_id": "ovn22.03-0:22.03.3-71.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.03-central-0:22.03.3-71.el9fdp.aarch64", "product": { "name": "ovn22.03-central-0:22.03.3-71.el9fdp.aarch64", "product_id": "ovn22.03-central-0:22.03.3-71.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-central@22.03.3-71.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.03-host-0:22.03.3-71.el9fdp.aarch64", "product": { "name": "ovn22.03-host-0:22.03.3-71.el9fdp.aarch64", "product_id": "ovn22.03-host-0:22.03.3-71.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-host@22.03.3-71.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.aarch64", "product": { "name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.aarch64", "product_id": "ovn22.03-vtep-0:22.03.3-71.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.3-71.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.aarch64", "product": { "name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.aarch64", "product_id": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.3-71.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.aarch64", "product": { "name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.aarch64", "product_id": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.3-71.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.aarch64", "product": { "name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.aarch64", "product_id": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.3-71.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.aarch64", "product": { "name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.aarch64", "product_id": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.3-71.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.aarch64", "product": { "name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.aarch64", "product_id": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.3-71.el9fdp?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ovn22.03-0:22.03.3-71.el9fdp.s390x", "product": { "name": "ovn22.03-0:22.03.3-71.el9fdp.s390x", "product_id": "ovn22.03-0:22.03.3-71.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.03-central-0:22.03.3-71.el9fdp.s390x", "product": { "name": "ovn22.03-central-0:22.03.3-71.el9fdp.s390x", "product_id": "ovn22.03-central-0:22.03.3-71.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-central@22.03.3-71.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.03-host-0:22.03.3-71.el9fdp.s390x", "product": { "name": "ovn22.03-host-0:22.03.3-71.el9fdp.s390x", "product_id": "ovn22.03-host-0:22.03.3-71.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-host@22.03.3-71.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.s390x", "product": { "name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.s390x", "product_id": "ovn22.03-vtep-0:22.03.3-71.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.3-71.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.s390x", "product": { "name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.s390x", "product_id": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.3-71.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.s390x", "product": { "name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.s390x", "product_id": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.3-71.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.s390x", "product": { "name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.s390x", "product_id": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.3-71.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.s390x", "product": { "name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.s390x", "product_id": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.3-71.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.s390x", "product": { "name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.s390x", "product_id": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.3-71.el9fdp?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-0:22.03.3-71.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.aarch64" }, "product_reference": "ovn22.03-0:22.03.3-71.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-0:22.03.3-71.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.ppc64le" }, "product_reference": "ovn22.03-0:22.03.3-71.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-0:22.03.3-71.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.s390x" }, "product_reference": "ovn22.03-0:22.03.3-71.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-0:22.03.3-71.el9fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.src" }, "product_reference": "ovn22.03-0:22.03.3-71.el9fdp.src", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-0:22.03.3-71.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.x86_64" }, "product_reference": "ovn22.03-0:22.03.3-71.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-central-0:22.03.3-71.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.aarch64" }, "product_reference": "ovn22.03-central-0:22.03.3-71.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-central-0:22.03.3-71.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.ppc64le" }, "product_reference": "ovn22.03-central-0:22.03.3-71.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-central-0:22.03.3-71.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.s390x" }, "product_reference": "ovn22.03-central-0:22.03.3-71.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-central-0:22.03.3-71.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.x86_64" }, "product_reference": "ovn22.03-central-0:22.03.3-71.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.aarch64" }, "product_reference": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.ppc64le" }, "product_reference": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.s390x" }, "product_reference": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.x86_64" }, "product_reference": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.aarch64" }, "product_reference": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.ppc64le" }, "product_reference": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.s390x" }, "product_reference": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.x86_64" }, "product_reference": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.aarch64" }, "product_reference": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.ppc64le" }, "product_reference": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.s390x" }, "product_reference": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.x86_64" }, "product_reference": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-host-0:22.03.3-71.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.aarch64" }, "product_reference": "ovn22.03-host-0:22.03.3-71.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-host-0:22.03.3-71.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.ppc64le" }, "product_reference": "ovn22.03-host-0:22.03.3-71.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-host-0:22.03.3-71.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.s390x" }, "product_reference": "ovn22.03-host-0:22.03.3-71.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-host-0:22.03.3-71.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.x86_64" }, "product_reference": "ovn22.03-host-0:22.03.3-71.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.aarch64" }, "product_reference": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.ppc64le" }, "product_reference": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.s390x" }, "product_reference": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.x86_64" }, "product_reference": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.aarch64" }, "product_reference": "ovn22.03-vtep-0:22.03.3-71.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.ppc64le" }, "product_reference": "ovn22.03-vtep-0:22.03.3-71.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.s390x" }, "product_reference": "ovn22.03-vtep-0:22.03.3-71.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.x86_64" }, "product_reference": "ovn22.03-vtep-0:22.03.3-71.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.aarch64" }, "product_reference": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.ppc64le" }, "product_reference": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.s390x" }, "product_reference": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.x86_64" }, "product_reference": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Frode Nordahl" ], "organization": "Canonical" } ], "cve": "CVE-2024-2182", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2024-03-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2267840" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "ovn: insufficient validation of BFD packets may lead to denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.src", "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-2182" }, { "category": "external", "summary": "RHBZ#2267840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2182" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182" }, { "category": "external", "summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html", "url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5", "url": "https://www.openwall.com/lists/oss-security/2024/03/12/5" } ], "release_date": "2024-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-03-19T15:47:23+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.src", "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1393" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.src", "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.x86_64", "9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.aarch64", "9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.s390x", "9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ovn: insufficient validation of BFD packets may lead to denial of service" } ] }
rhsa-2024_1388
Vulnerability from csaf_redhat
Published
2024-03-19 15:42
Modified
2024-11-15 16:11
Summary
Red Hat Security Advisory: ovn23.03 security update
Notes
Topic
An update for ovn23.03 is now available in Fast Datapath for Red Hat
Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn23.03: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ovn23.03 is now available in Fast Datapath for Red Hat\nEnterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn23.03: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1388", "url": "https://access.redhat.com/errata/RHSA-2024:1388" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1388.json" } ], "title": "Red Hat Security Advisory: ovn23.03 security update", "tracking": { "current_release_date": "2024-11-15T16:11:43+00:00", "generator": { "date": "2024-11-15T16:11:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:1388", "initial_release_date": "2024-03-19T15:42:17+00:00", "revision_history": [ { "date": "2024-03-19T15:42:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-03-19T15:42:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T16:11:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Fast Datapath for Red Hat Enterprise Linux 8", "product": { "name": "Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::fastdatapath" } } } ], "category": "product_family", "name": "Fast Datapath" }, { "branches": [ { "category": "product_version", "name": "ovn23.03-0:23.03.1-100.el8fdp.src", "product": { "name": "ovn23.03-0:23.03.1-100.el8fdp.src", "product_id": "ovn23.03-0:23.03.1-100.el8fdp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el8fdp?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ovn23.03-0:23.03.1-100.el8fdp.x86_64", "product": { "name": "ovn23.03-0:23.03.1-100.el8fdp.x86_64", "product_id": "ovn23.03-0:23.03.1-100.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.03-central-0:23.03.1-100.el8fdp.x86_64", "product": { "name": "ovn23.03-central-0:23.03.1-100.el8fdp.x86_64", "product_id": "ovn23.03-central-0:23.03.1-100.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-central@23.03.1-100.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.03-host-0:23.03.1-100.el8fdp.x86_64", "product": { "name": "ovn23.03-host-0:23.03.1-100.el8fdp.x86_64", "product_id": "ovn23.03-host-0:23.03.1-100.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-host@23.03.1-100.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.x86_64", "product": { "name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.x86_64", "product_id": "ovn23.03-vtep-0:23.03.1-100.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-vtep@23.03.1-100.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.x86_64", "product": { "name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.x86_64", "product_id": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-debugsource@23.03.1-100.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.x86_64", "product": { "name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.x86_64", "product_id": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-central-debuginfo@23.03.1-100.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.x86_64", "product": { "name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.x86_64", "product_id": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-debuginfo@23.03.1-100.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.x86_64", "product": { "name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.x86_64", "product_id": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-host-debuginfo@23.03.1-100.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.x86_64", "product": { "name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.x86_64", "product_id": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-vtep-debuginfo@23.03.1-100.el8fdp?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ovn23.03-0:23.03.1-100.el8fdp.ppc64le", "product": { "name": "ovn23.03-0:23.03.1-100.el8fdp.ppc64le", "product_id": "ovn23.03-0:23.03.1-100.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.03-central-0:23.03.1-100.el8fdp.ppc64le", "product": { "name": "ovn23.03-central-0:23.03.1-100.el8fdp.ppc64le", "product_id": "ovn23.03-central-0:23.03.1-100.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-central@23.03.1-100.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.03-host-0:23.03.1-100.el8fdp.ppc64le", "product": { "name": "ovn23.03-host-0:23.03.1-100.el8fdp.ppc64le", "product_id": "ovn23.03-host-0:23.03.1-100.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-host@23.03.1-100.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.ppc64le", "product": { "name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.ppc64le", "product_id": "ovn23.03-vtep-0:23.03.1-100.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-vtep@23.03.1-100.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.ppc64le", "product": { "name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.ppc64le", "product_id": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-debugsource@23.03.1-100.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "product": { "name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "product_id": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-central-debuginfo@23.03.1-100.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "product": { "name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "product_id": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-debuginfo@23.03.1-100.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "product": { "name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "product_id": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-host-debuginfo@23.03.1-100.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "product": { "name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "product_id": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-vtep-debuginfo@23.03.1-100.el8fdp?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ovn23.03-0:23.03.1-100.el8fdp.aarch64", "product": { "name": "ovn23.03-0:23.03.1-100.el8fdp.aarch64", "product_id": "ovn23.03-0:23.03.1-100.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.03-central-0:23.03.1-100.el8fdp.aarch64", "product": { "name": "ovn23.03-central-0:23.03.1-100.el8fdp.aarch64", "product_id": "ovn23.03-central-0:23.03.1-100.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-central@23.03.1-100.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.03-host-0:23.03.1-100.el8fdp.aarch64", "product": { "name": "ovn23.03-host-0:23.03.1-100.el8fdp.aarch64", "product_id": "ovn23.03-host-0:23.03.1-100.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-host@23.03.1-100.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.aarch64", "product": { "name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.aarch64", "product_id": "ovn23.03-vtep-0:23.03.1-100.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-vtep@23.03.1-100.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.aarch64", "product": { "name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.aarch64", "product_id": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-debugsource@23.03.1-100.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.aarch64", "product": { "name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.aarch64", "product_id": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-central-debuginfo@23.03.1-100.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.aarch64", "product": { "name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.aarch64", "product_id": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-debuginfo@23.03.1-100.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.aarch64", "product": { "name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.aarch64", "product_id": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-host-debuginfo@23.03.1-100.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.aarch64", "product": { "name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.aarch64", "product_id": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-vtep-debuginfo@23.03.1-100.el8fdp?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ovn23.03-0:23.03.1-100.el8fdp.s390x", "product": { "name": "ovn23.03-0:23.03.1-100.el8fdp.s390x", "product_id": "ovn23.03-0:23.03.1-100.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.03-central-0:23.03.1-100.el8fdp.s390x", "product": { "name": "ovn23.03-central-0:23.03.1-100.el8fdp.s390x", "product_id": "ovn23.03-central-0:23.03.1-100.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-central@23.03.1-100.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.03-host-0:23.03.1-100.el8fdp.s390x", "product": { "name": "ovn23.03-host-0:23.03.1-100.el8fdp.s390x", "product_id": "ovn23.03-host-0:23.03.1-100.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-host@23.03.1-100.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.s390x", "product": { "name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.s390x", "product_id": "ovn23.03-vtep-0:23.03.1-100.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-vtep@23.03.1-100.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.s390x", "product": { "name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.s390x", "product_id": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-debugsource@23.03.1-100.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.s390x", "product": { "name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.s390x", "product_id": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-central-debuginfo@23.03.1-100.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.s390x", "product": { "name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.s390x", "product_id": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-debuginfo@23.03.1-100.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.s390x", "product": { "name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.s390x", "product_id": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-host-debuginfo@23.03.1-100.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.s390x", "product": { "name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.s390x", "product_id": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.03-vtep-debuginfo@23.03.1-100.el8fdp?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-0:23.03.1-100.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.aarch64" }, "product_reference": "ovn23.03-0:23.03.1-100.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-0:23.03.1-100.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.ppc64le" }, "product_reference": "ovn23.03-0:23.03.1-100.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-0:23.03.1-100.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.s390x" }, "product_reference": "ovn23.03-0:23.03.1-100.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-0:23.03.1-100.el8fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.src" }, "product_reference": "ovn23.03-0:23.03.1-100.el8fdp.src", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-0:23.03.1-100.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.x86_64" }, "product_reference": "ovn23.03-0:23.03.1-100.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-central-0:23.03.1-100.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.aarch64" }, "product_reference": "ovn23.03-central-0:23.03.1-100.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-central-0:23.03.1-100.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.ppc64le" }, "product_reference": "ovn23.03-central-0:23.03.1-100.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-central-0:23.03.1-100.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.s390x" }, "product_reference": "ovn23.03-central-0:23.03.1-100.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-central-0:23.03.1-100.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.x86_64" }, "product_reference": "ovn23.03-central-0:23.03.1-100.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.aarch64" }, "product_reference": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.ppc64le" }, "product_reference": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.s390x" }, "product_reference": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.x86_64" }, "product_reference": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.aarch64" }, "product_reference": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.ppc64le" }, "product_reference": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.s390x" }, "product_reference": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.x86_64" }, "product_reference": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.aarch64" }, "product_reference": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.ppc64le" }, "product_reference": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.s390x" }, "product_reference": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.x86_64" }, "product_reference": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-host-0:23.03.1-100.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.aarch64" }, "product_reference": "ovn23.03-host-0:23.03.1-100.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-host-0:23.03.1-100.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.ppc64le" }, "product_reference": "ovn23.03-host-0:23.03.1-100.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-host-0:23.03.1-100.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.s390x" }, "product_reference": "ovn23.03-host-0:23.03.1-100.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-host-0:23.03.1-100.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.x86_64" }, "product_reference": "ovn23.03-host-0:23.03.1-100.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.aarch64" }, "product_reference": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.ppc64le" }, "product_reference": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.s390x" }, "product_reference": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.x86_64" }, "product_reference": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.aarch64" }, "product_reference": "ovn23.03-vtep-0:23.03.1-100.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.ppc64le" }, "product_reference": "ovn23.03-vtep-0:23.03.1-100.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.s390x" }, "product_reference": "ovn23.03-vtep-0:23.03.1-100.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.x86_64" }, "product_reference": "ovn23.03-vtep-0:23.03.1-100.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.aarch64" }, "product_reference": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.ppc64le" }, "product_reference": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.s390x" }, "product_reference": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.x86_64" }, "product_reference": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Frode Nordahl" ], "organization": "Canonical" } ], "cve": "CVE-2024-2182", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2024-03-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2267840" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "ovn: insufficient validation of BFD packets may lead to denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.src", "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-2182" }, { "category": "external", "summary": "RHBZ#2267840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2182" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182" }, { "category": "external", "summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html", "url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5", "url": "https://www.openwall.com/lists/oss-security/2024/03/12/5" } ], "release_date": "2024-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-03-19T15:42:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.src", "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1388" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.src", "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ovn: insufficient validation of BFD packets may lead to denial of service" } ] }
rhsa-2024_1390
Vulnerability from csaf_redhat
Published
2024-03-19 15:46
Modified
2024-11-15 16:10
Summary
Red Hat Security Advisory: ovn23.09 security update
Notes
Topic
An update for ovn23.09 is now available in Fast Datapath for Red Hat
Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn23.09: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ovn23.09 is now available in Fast Datapath for Red Hat\nEnterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn23.09: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1390", "url": "https://access.redhat.com/errata/RHSA-2024:1390" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1390.json" } ], "title": "Red Hat Security Advisory: ovn23.09 security update", "tracking": { "current_release_date": "2024-11-15T16:10:52+00:00", "generator": { "date": "2024-11-15T16:10:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:1390", "initial_release_date": "2024-03-19T15:46:14+00:00", "revision_history": [ { "date": "2024-03-19T15:46:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-03-19T15:46:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T16:10:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Fast Datapath for Red Hat Enterprise Linux 9", "product": { "name": "Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:9::fastdatapath" } } } ], "category": "product_family", "name": "Fast Datapath" }, { "branches": [ { "category": "product_version", "name": "ovn23.09-0:23.09.0-136.el9fdp.src", "product": { "name": "ovn23.09-0:23.09.0-136.el9fdp.src", "product_id": "ovn23.09-0:23.09.0-136.el9fdp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09@23.09.0-136.el9fdp?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ovn23.09-0:23.09.0-136.el9fdp.x86_64", "product": { "name": "ovn23.09-0:23.09.0-136.el9fdp.x86_64", "product_id": "ovn23.09-0:23.09.0-136.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09@23.09.0-136.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.09-central-0:23.09.0-136.el9fdp.x86_64", "product": { "name": "ovn23.09-central-0:23.09.0-136.el9fdp.x86_64", "product_id": "ovn23.09-central-0:23.09.0-136.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-central@23.09.0-136.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.09-host-0:23.09.0-136.el9fdp.x86_64", "product": { "name": "ovn23.09-host-0:23.09.0-136.el9fdp.x86_64", "product_id": "ovn23.09-host-0:23.09.0-136.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-host@23.09.0-136.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.x86_64", "product": { "name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.x86_64", "product_id": "ovn23.09-vtep-0:23.09.0-136.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-vtep@23.09.0-136.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.x86_64", "product": { "name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.x86_64", "product_id": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-debugsource@23.09.0-136.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.x86_64", "product": { "name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.x86_64", "product_id": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-central-debuginfo@23.09.0-136.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.x86_64", "product": { "name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.x86_64", "product_id": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-debuginfo@23.09.0-136.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.x86_64", "product": { "name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.x86_64", "product_id": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-host-debuginfo@23.09.0-136.el9fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.x86_64", "product": { "name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.x86_64", "product_id": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-vtep-debuginfo@23.09.0-136.el9fdp?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ovn23.09-0:23.09.0-136.el9fdp.ppc64le", "product": { "name": "ovn23.09-0:23.09.0-136.el9fdp.ppc64le", "product_id": "ovn23.09-0:23.09.0-136.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09@23.09.0-136.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.09-central-0:23.09.0-136.el9fdp.ppc64le", "product": { "name": "ovn23.09-central-0:23.09.0-136.el9fdp.ppc64le", "product_id": "ovn23.09-central-0:23.09.0-136.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-central@23.09.0-136.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.09-host-0:23.09.0-136.el9fdp.ppc64le", "product": { "name": "ovn23.09-host-0:23.09.0-136.el9fdp.ppc64le", "product_id": "ovn23.09-host-0:23.09.0-136.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-host@23.09.0-136.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.ppc64le", "product": { "name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.ppc64le", "product_id": "ovn23.09-vtep-0:23.09.0-136.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-vtep@23.09.0-136.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.ppc64le", "product": { "name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.ppc64le", "product_id": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-debugsource@23.09.0-136.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "product": { "name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "product_id": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-central-debuginfo@23.09.0-136.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "product": { "name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "product_id": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-debuginfo@23.09.0-136.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "product": { "name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "product_id": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-host-debuginfo@23.09.0-136.el9fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "product": { "name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "product_id": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-vtep-debuginfo@23.09.0-136.el9fdp?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ovn23.09-0:23.09.0-136.el9fdp.aarch64", "product": { "name": "ovn23.09-0:23.09.0-136.el9fdp.aarch64", "product_id": "ovn23.09-0:23.09.0-136.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09@23.09.0-136.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.09-central-0:23.09.0-136.el9fdp.aarch64", "product": { "name": "ovn23.09-central-0:23.09.0-136.el9fdp.aarch64", "product_id": "ovn23.09-central-0:23.09.0-136.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-central@23.09.0-136.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.09-host-0:23.09.0-136.el9fdp.aarch64", "product": { "name": "ovn23.09-host-0:23.09.0-136.el9fdp.aarch64", "product_id": "ovn23.09-host-0:23.09.0-136.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-host@23.09.0-136.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.aarch64", "product": { "name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.aarch64", "product_id": "ovn23.09-vtep-0:23.09.0-136.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-vtep@23.09.0-136.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.aarch64", "product": { "name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.aarch64", "product_id": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-debugsource@23.09.0-136.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.aarch64", "product": { "name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.aarch64", "product_id": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-central-debuginfo@23.09.0-136.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.aarch64", "product": { "name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.aarch64", "product_id": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-debuginfo@23.09.0-136.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.aarch64", "product": { "name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.aarch64", "product_id": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-host-debuginfo@23.09.0-136.el9fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.aarch64", "product": { "name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.aarch64", "product_id": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-vtep-debuginfo@23.09.0-136.el9fdp?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ovn23.09-0:23.09.0-136.el9fdp.s390x", "product": { "name": "ovn23.09-0:23.09.0-136.el9fdp.s390x", "product_id": "ovn23.09-0:23.09.0-136.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09@23.09.0-136.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.09-central-0:23.09.0-136.el9fdp.s390x", "product": { "name": "ovn23.09-central-0:23.09.0-136.el9fdp.s390x", "product_id": "ovn23.09-central-0:23.09.0-136.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-central@23.09.0-136.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.09-host-0:23.09.0-136.el9fdp.s390x", "product": { "name": "ovn23.09-host-0:23.09.0-136.el9fdp.s390x", "product_id": "ovn23.09-host-0:23.09.0-136.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-host@23.09.0-136.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.s390x", "product": { "name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.s390x", "product_id": "ovn23.09-vtep-0:23.09.0-136.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-vtep@23.09.0-136.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.s390x", "product": { "name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.s390x", "product_id": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-debugsource@23.09.0-136.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.s390x", "product": { "name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.s390x", "product_id": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-central-debuginfo@23.09.0-136.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.s390x", "product": { "name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.s390x", "product_id": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-debuginfo@23.09.0-136.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.s390x", "product": { "name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.s390x", "product_id": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-host-debuginfo@23.09.0-136.el9fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.s390x", "product": { "name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.s390x", "product_id": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.09-vtep-debuginfo@23.09.0-136.el9fdp?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-0:23.09.0-136.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.aarch64" }, "product_reference": "ovn23.09-0:23.09.0-136.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-0:23.09.0-136.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.ppc64le" }, "product_reference": "ovn23.09-0:23.09.0-136.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-0:23.09.0-136.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.s390x" }, "product_reference": "ovn23.09-0:23.09.0-136.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-0:23.09.0-136.el9fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.src" }, "product_reference": "ovn23.09-0:23.09.0-136.el9fdp.src", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-0:23.09.0-136.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.x86_64" }, "product_reference": "ovn23.09-0:23.09.0-136.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-central-0:23.09.0-136.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.aarch64" }, "product_reference": "ovn23.09-central-0:23.09.0-136.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-central-0:23.09.0-136.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.ppc64le" }, "product_reference": "ovn23.09-central-0:23.09.0-136.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-central-0:23.09.0-136.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.s390x" }, "product_reference": "ovn23.09-central-0:23.09.0-136.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-central-0:23.09.0-136.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.x86_64" }, "product_reference": "ovn23.09-central-0:23.09.0-136.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.aarch64" }, "product_reference": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.ppc64le" }, "product_reference": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.s390x" }, "product_reference": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.x86_64" }, "product_reference": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.aarch64" }, "product_reference": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.ppc64le" }, "product_reference": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.s390x" }, "product_reference": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.x86_64" }, "product_reference": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.aarch64" }, "product_reference": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.ppc64le" }, "product_reference": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.s390x" }, "product_reference": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.x86_64" }, "product_reference": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-host-0:23.09.0-136.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.aarch64" }, "product_reference": "ovn23.09-host-0:23.09.0-136.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-host-0:23.09.0-136.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.ppc64le" }, "product_reference": "ovn23.09-host-0:23.09.0-136.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-host-0:23.09.0-136.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.s390x" }, "product_reference": "ovn23.09-host-0:23.09.0-136.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-host-0:23.09.0-136.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.x86_64" }, "product_reference": "ovn23.09-host-0:23.09.0-136.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.aarch64" }, "product_reference": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.ppc64le" }, "product_reference": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.s390x" }, "product_reference": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.x86_64" }, "product_reference": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.aarch64" }, "product_reference": "ovn23.09-vtep-0:23.09.0-136.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.ppc64le" }, "product_reference": "ovn23.09-vtep-0:23.09.0-136.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.s390x" }, "product_reference": "ovn23.09-vtep-0:23.09.0-136.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.x86_64" }, "product_reference": "ovn23.09-vtep-0:23.09.0-136.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.aarch64" }, "product_reference": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.aarch64", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.ppc64le" }, "product_reference": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.s390x" }, "product_reference": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.s390x", "relates_to_product_reference": "9Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9", "product_id": "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.x86_64" }, "product_reference": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.x86_64", "relates_to_product_reference": "9Base-Fast-Datapath" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Frode Nordahl" ], "organization": "Canonical" } ], "cve": "CVE-2024-2182", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2024-03-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2267840" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "ovn: insufficient validation of BFD packets may lead to denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.src", "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-2182" }, { "category": "external", "summary": "RHBZ#2267840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2182" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182" }, { "category": "external", "summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html", "url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5", "url": "https://www.openwall.com/lists/oss-security/2024/03/12/5" } ], "release_date": "2024-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-03-19T15:46:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.src", "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.src", "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.x86_64", "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.aarch64", "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.ppc64le", "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.s390x", "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ovn: insufficient validation of BFD packets may lead to denial of service" } ] }
rhsa-2024_1385
Vulnerability from csaf_redhat
Published
2024-03-19 15:40
Modified
2024-11-15 16:11
Summary
Red Hat Security Advisory: ovn23.06 security update
Notes
Topic
An update for ovn23.06 is now available in Fast Datapath for Red Hat
Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn23.06: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ovn23.06 is now available in Fast Datapath for Red Hat\nEnterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn23.06: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1385", "url": "https://access.redhat.com/errata/RHSA-2024:1385" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1385.json" } ], "title": "Red Hat Security Advisory: ovn23.06 security update", "tracking": { "current_release_date": "2024-11-15T16:11:33+00:00", "generator": { "date": "2024-11-15T16:11:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:1385", "initial_release_date": "2024-03-19T15:40:19+00:00", "revision_history": [ { "date": "2024-03-19T15:40:19+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-03-19T15:40:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T16:11:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Fast Datapath for Red Hat Enterprise Linux 8", "product": { "name": "Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::fastdatapath" } } } ], "category": "product_family", "name": "Fast Datapath" }, { "branches": [ { "category": "product_version", "name": "ovn23.06-0:23.06.1-112.el8fdp.src", "product": { "name": "ovn23.06-0:23.06.1-112.el8fdp.src", "product_id": "ovn23.06-0:23.06.1-112.el8fdp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el8fdp?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ovn23.06-0:23.06.1-112.el8fdp.x86_64", "product": { "name": "ovn23.06-0:23.06.1-112.el8fdp.x86_64", "product_id": "ovn23.06-0:23.06.1-112.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.06-central-0:23.06.1-112.el8fdp.x86_64", "product": { "name": "ovn23.06-central-0:23.06.1-112.el8fdp.x86_64", "product_id": "ovn23.06-central-0:23.06.1-112.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-central@23.06.1-112.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.06-host-0:23.06.1-112.el8fdp.x86_64", "product": { "name": "ovn23.06-host-0:23.06.1-112.el8fdp.x86_64", "product_id": "ovn23.06-host-0:23.06.1-112.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-host@23.06.1-112.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.x86_64", "product": { "name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.x86_64", "product_id": "ovn23.06-vtep-0:23.06.1-112.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.1-112.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.x86_64", "product": { "name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.x86_64", "product_id": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.1-112.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.x86_64", "product": { "name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.x86_64", "product_id": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.1-112.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.x86_64", "product": { "name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.x86_64", "product_id": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.1-112.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.x86_64", "product": { "name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.x86_64", "product_id": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.1-112.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.x86_64", "product": { "name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.x86_64", "product_id": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.1-112.el8fdp?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ovn23.06-0:23.06.1-112.el8fdp.ppc64le", "product": { "name": "ovn23.06-0:23.06.1-112.el8fdp.ppc64le", "product_id": "ovn23.06-0:23.06.1-112.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.06-central-0:23.06.1-112.el8fdp.ppc64le", "product": { "name": "ovn23.06-central-0:23.06.1-112.el8fdp.ppc64le", "product_id": "ovn23.06-central-0:23.06.1-112.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-central@23.06.1-112.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.06-host-0:23.06.1-112.el8fdp.ppc64le", "product": { "name": "ovn23.06-host-0:23.06.1-112.el8fdp.ppc64le", "product_id": "ovn23.06-host-0:23.06.1-112.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-host@23.06.1-112.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.ppc64le", "product": { "name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.ppc64le", "product_id": "ovn23.06-vtep-0:23.06.1-112.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.1-112.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.ppc64le", "product": { "name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.ppc64le", "product_id": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.1-112.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "product": { "name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "product_id": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.1-112.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "product": { "name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "product_id": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.1-112.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "product": { "name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "product_id": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.1-112.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "product": { "name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "product_id": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.1-112.el8fdp?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ovn23.06-0:23.06.1-112.el8fdp.aarch64", "product": { "name": "ovn23.06-0:23.06.1-112.el8fdp.aarch64", "product_id": "ovn23.06-0:23.06.1-112.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.06-central-0:23.06.1-112.el8fdp.aarch64", "product": { "name": "ovn23.06-central-0:23.06.1-112.el8fdp.aarch64", "product_id": "ovn23.06-central-0:23.06.1-112.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-central@23.06.1-112.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.06-host-0:23.06.1-112.el8fdp.aarch64", "product": { "name": "ovn23.06-host-0:23.06.1-112.el8fdp.aarch64", "product_id": "ovn23.06-host-0:23.06.1-112.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-host@23.06.1-112.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.aarch64", "product": { "name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.aarch64", "product_id": "ovn23.06-vtep-0:23.06.1-112.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.1-112.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.aarch64", "product": { "name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.aarch64", "product_id": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.1-112.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.aarch64", "product": { "name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.aarch64", "product_id": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.1-112.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.aarch64", "product": { "name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.aarch64", "product_id": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.1-112.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.aarch64", "product": { "name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.aarch64", "product_id": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.1-112.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.aarch64", "product": { "name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.aarch64", "product_id": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.1-112.el8fdp?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ovn23.06-0:23.06.1-112.el8fdp.s390x", "product": { "name": "ovn23.06-0:23.06.1-112.el8fdp.s390x", "product_id": "ovn23.06-0:23.06.1-112.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.06-central-0:23.06.1-112.el8fdp.s390x", "product": { "name": "ovn23.06-central-0:23.06.1-112.el8fdp.s390x", "product_id": "ovn23.06-central-0:23.06.1-112.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-central@23.06.1-112.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.06-host-0:23.06.1-112.el8fdp.s390x", "product": { "name": "ovn23.06-host-0:23.06.1-112.el8fdp.s390x", "product_id": "ovn23.06-host-0:23.06.1-112.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-host@23.06.1-112.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.s390x", "product": { "name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.s390x", "product_id": "ovn23.06-vtep-0:23.06.1-112.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.1-112.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.s390x", "product": { "name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.s390x", "product_id": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.1-112.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.s390x", "product": { "name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.s390x", "product_id": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.1-112.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.s390x", "product": { "name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.s390x", "product_id": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.1-112.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.s390x", "product": { "name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.s390x", "product_id": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.1-112.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.s390x", "product": { "name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.s390x", "product_id": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.1-112.el8fdp?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-0:23.06.1-112.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.aarch64" }, "product_reference": "ovn23.06-0:23.06.1-112.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-0:23.06.1-112.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.ppc64le" }, "product_reference": "ovn23.06-0:23.06.1-112.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-0:23.06.1-112.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.s390x" }, "product_reference": "ovn23.06-0:23.06.1-112.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-0:23.06.1-112.el8fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.src" }, "product_reference": "ovn23.06-0:23.06.1-112.el8fdp.src", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-0:23.06.1-112.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.x86_64" }, "product_reference": "ovn23.06-0:23.06.1-112.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-central-0:23.06.1-112.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.aarch64" }, "product_reference": "ovn23.06-central-0:23.06.1-112.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-central-0:23.06.1-112.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.ppc64le" }, "product_reference": "ovn23.06-central-0:23.06.1-112.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-central-0:23.06.1-112.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.s390x" }, "product_reference": "ovn23.06-central-0:23.06.1-112.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-central-0:23.06.1-112.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.x86_64" }, "product_reference": "ovn23.06-central-0:23.06.1-112.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.aarch64" }, "product_reference": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.ppc64le" }, "product_reference": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.s390x" }, "product_reference": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.x86_64" }, "product_reference": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.aarch64" }, "product_reference": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.ppc64le" }, "product_reference": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.s390x" }, "product_reference": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.x86_64" }, "product_reference": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.aarch64" }, "product_reference": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.ppc64le" }, "product_reference": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.s390x" }, "product_reference": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.x86_64" }, "product_reference": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-host-0:23.06.1-112.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.aarch64" }, "product_reference": "ovn23.06-host-0:23.06.1-112.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-host-0:23.06.1-112.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.ppc64le" }, "product_reference": "ovn23.06-host-0:23.06.1-112.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-host-0:23.06.1-112.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.s390x" }, "product_reference": "ovn23.06-host-0:23.06.1-112.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-host-0:23.06.1-112.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.x86_64" }, "product_reference": "ovn23.06-host-0:23.06.1-112.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.aarch64" }, "product_reference": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.ppc64le" }, "product_reference": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.s390x" }, "product_reference": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.x86_64" }, "product_reference": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.aarch64" }, "product_reference": "ovn23.06-vtep-0:23.06.1-112.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.ppc64le" }, "product_reference": "ovn23.06-vtep-0:23.06.1-112.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.s390x" }, "product_reference": "ovn23.06-vtep-0:23.06.1-112.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.x86_64" }, "product_reference": "ovn23.06-vtep-0:23.06.1-112.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.aarch64" }, "product_reference": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.aarch64", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.ppc64le" }, "product_reference": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.s390x" }, "product_reference": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.s390x", "relates_to_product_reference": "8Base-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8", "product_id": "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.x86_64" }, "product_reference": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.x86_64", "relates_to_product_reference": "8Base-Fast-Datapath" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Frode Nordahl" ], "organization": "Canonical" } ], "cve": "CVE-2024-2182", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2024-03-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2267840" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "ovn: insufficient validation of BFD packets may lead to denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.src", "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-2182" }, { "category": "external", "summary": "RHBZ#2267840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2182" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182" }, { "category": "external", "summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html", "url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5", "url": "https://www.openwall.com/lists/oss-security/2024/03/12/5" } ], "release_date": "2024-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-03-19T15:40:19+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.src", "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1385" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.src", "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.x86_64", "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.aarch64", "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.ppc64le", "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.s390x", "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ovn: insufficient validation of BFD packets may lead to denial of service" } ] }
ghsa-p67c-35g3-9pqc
Vulnerability from github
Published
2024-03-12 18:31
Modified
2024-06-21 00:33
Severity ?
Details
A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.
{ "affected": [], "aliases": [ "CVE-2024-2182" ], "database_specific": { "cwe_ids": [ "CWE-346" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-03-12T17:15:59Z", "severity": "MODERATE" }, "details": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.", "id": "GHSA-p67c-35g3-9pqc", "modified": "2024-06-21T00:33:10Z", "published": "2024-03-12T18:31:15Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182" }, { "type": "WEB", "url": "https://www.openwall.com/lists/oss-security/2024/03/12/5" }, { "type": "WEB", "url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRKXOOOKD56TY3JQVB45N3GCTX3EG4BV" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CB4N522FCS4XWAPUKRWZF6QZ657FCIDF" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APR4GCVCMQD3DQUKXDNGIXCCYGE5V7IT" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2024-2182" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:4035" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:1394" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:1393" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:1392" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:1391" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:1390" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:1388" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:1387" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:1386" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:1385" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2024/03/12/5" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
wid-sec-w-2024-0664
Vulnerability from csaf_certbund
Published
2024-03-19 23:00
Modified
2024-03-19 23:00
Summary
Red Hat Enterprise Linux: Schwachstelle ermöglicht Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat Enterprise Linux (RHEL) ist eine populäre Linux-Distribution.
Angriff
Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0664 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0664.json" }, { "category": "self", "summary": "WID-SEC-2024-0664 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0664" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-03-19", "url": "https://access.redhat.com/errata/RHSA-2024:1385" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-03-19", "url": "https://access.redhat.com/errata/RHSA-2024:1386" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-03-19", "url": "https://access.redhat.com/errata/RHSA-2024:1387" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-03-19", "url": "https://access.redhat.com/errata/RHSA-2024:1388" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-03-19", "url": "https://access.redhat.com/errata/RHSA-2024:1390" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-03-19", "url": "https://access.redhat.com/errata/RHSA-2024:1391" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-03-19", "url": "https://access.redhat.com/errata/RHSA-2024:1392" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-03-19", "url": "https://access.redhat.com/errata/RHSA-2024:1393" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-03-19", "url": "https://access.redhat.com/errata/RHSA-2024:1394" } ], "source_lang": "en-US", "title": "Red Hat Enterprise Linux: Schwachstelle erm\u00f6glicht Denial of Service", "tracking": { "current_release_date": "2024-03-19T23:00:00.000+00:00", "generator": { "date": "2024-03-20T09:36:01.227+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0664", "initial_release_date": "2024-03-19T23:00:00.000+00:00", "revision_history": [ { "date": "2024-03-19T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "8", "product": { "name": "Red Hat Enterprise Linux 8", "product_id": "T014111", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8" } } } ], "category": "product_name", "name": "Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-2182", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Red Hat Enterprise Linux. Diese besteht in der Komponente OVN und ist darauf zur\u00fcckzuf\u00fchren, dass es mithilfe von manipulierten BFD Paketen m\u00f6glich ist einen Absturz zu verursachen. Ein entfernter, authentisierter Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T014111" ] }, "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2024-2182" } ] }
WID-SEC-W-2024-0664
Vulnerability from csaf_certbund
Published
2024-03-19 23:00
Modified
2024-03-19 23:00
Summary
Red Hat Enterprise Linux: Schwachstelle ermöglicht Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat Enterprise Linux (RHEL) ist eine populäre Linux-Distribution.
Angriff
Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0664 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0664.json" }, { "category": "self", "summary": "WID-SEC-2024-0664 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0664" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-03-19", "url": "https://access.redhat.com/errata/RHSA-2024:1385" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-03-19", "url": "https://access.redhat.com/errata/RHSA-2024:1386" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-03-19", "url": "https://access.redhat.com/errata/RHSA-2024:1387" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-03-19", "url": "https://access.redhat.com/errata/RHSA-2024:1388" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-03-19", "url": "https://access.redhat.com/errata/RHSA-2024:1390" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-03-19", "url": "https://access.redhat.com/errata/RHSA-2024:1391" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-03-19", "url": "https://access.redhat.com/errata/RHSA-2024:1392" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-03-19", "url": "https://access.redhat.com/errata/RHSA-2024:1393" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-03-19", "url": "https://access.redhat.com/errata/RHSA-2024:1394" } ], "source_lang": "en-US", "title": "Red Hat Enterprise Linux: Schwachstelle erm\u00f6glicht Denial of Service", "tracking": { "current_release_date": "2024-03-19T23:00:00.000+00:00", "generator": { "date": "2024-03-20T09:36:01.227+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0664", "initial_release_date": "2024-03-19T23:00:00.000+00:00", "revision_history": [ { "date": "2024-03-19T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "8", "product": { "name": "Red Hat Enterprise Linux 8", "product_id": "T014111", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8" } } } ], "category": "product_name", "name": "Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-2182", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Red Hat Enterprise Linux. Diese besteht in der Komponente OVN und ist darauf zur\u00fcckzuf\u00fchren, dass es mithilfe von manipulierten BFD Paketen m\u00f6glich ist einen Absturz zu verursachen. Ein entfernter, authentisierter Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T014111" ] }, "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2024-2182" } ] }
gsd-2024-2182
Vulnerability from gsd
Modified
2024-03-05 06:02
Details
A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.
Aliases
{ "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2024-2182" ], "details": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.", "id": "GSD-2024-2182", "modified": "2024-03-05T06:02:27.299783Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2024-2182", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fast Datapath for Red Hat Enterprise Linux 8", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:23.06.1-112.el8fdp", "versionType": "rpm" } ] } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:22.12.1-94.el8fdp", "versionType": "rpm" } ] } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:22.03.3-71.el8fdp", "versionType": "rpm" } ] } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:23.03.1-100.el8fdp", "versionType": "rpm" } ] } } ] } }, { "product_name": "Fast Datapath for Red Hat Enterprise Linux 9", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:23.09.0-136.el9fdp", "versionType": "rpm" } ] } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:23.06.1-112.el9fdp", "versionType": "rpm" } ] } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:22.12.1-94.el9fdp", "versionType": "rpm" } ] } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:22.03.3-71.el9fdp", "versionType": "rpm" } ] } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:23.03.1-100.el9fdp", "versionType": "rpm" } ] } } ] } }, { "product_name": "Fast Datapath for RHEL 7", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "unknown" } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "unknown" } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "unknown" } } ] } }, { "product_name": "Fast Datapath for RHEL 8", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "unknown" } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "unknown" } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "unknown" } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "unknown" } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "unknown" } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "unknown" } } ] } }, { "product_name": "Fast Datapath for RHEL 9", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected" } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "unknown" } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "unknown" } } ] } }, { "product_name": "Red Hat OpenShift Container Platform 4", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected" } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected" } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected" } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected" } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected" } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected" } } ] } } ] }, "vendor_name": "Red Hat" } ] } }, "credits": [ { "lang": "en", "value": "Red Hat would like to thank Frode Nordahl (Canonical) for reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service." } ] }, "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-346", "lang": "eng", "value": "Origin Validation Error" } ] } ] }, "references": { "reference_data": [ { "name": "https://access.redhat.com/errata/RHSA-2024:1385", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:1385" }, { "name": "https://access.redhat.com/errata/RHSA-2024:1386", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:1386" }, { "name": "https://access.redhat.com/errata/RHSA-2024:1387", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:1387" }, { "name": "https://access.redhat.com/errata/RHSA-2024:1388", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:1388" }, { "name": "https://access.redhat.com/errata/RHSA-2024:1390", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:1390" }, { "name": "https://access.redhat.com/errata/RHSA-2024:1391", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:1391" }, { "name": "https://access.redhat.com/errata/RHSA-2024:1392", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:1392" }, { "name": "https://access.redhat.com/errata/RHSA-2024:1393", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:1393" }, { "name": "https://access.redhat.com/errata/RHSA-2024:1394", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:1394" }, { "name": "https://access.redhat.com/security/cve/CVE-2024-2182", "refsource": "MISC", "url": "https://access.redhat.com/security/cve/CVE-2024-2182" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APR4GCVCMQD3DQUKXDNGIXCCYGE5V7IT/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APR4GCVCMQD3DQUKXDNGIXCCYGE5V7IT/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CB4N522FCS4XWAPUKRWZF6QZ657FCIDF/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CB4N522FCS4XWAPUKRWZF6QZ657FCIDF/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRKXOOOKD56TY3JQVB45N3GCTX3EG4BV/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRKXOOOKD56TY3JQVB45N3GCTX3EG4BV/" }, { "name": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html", "refsource": "MISC", "url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html" }, { "name": "https://www.openwall.com/lists/oss-security/2024/03/12/5", "refsource": "MISC", "url": "https://www.openwall.com/lists/oss-security/2024/03/12/5" } ] } }, "nvd.nist.gov": { "cve": { "descriptions": [ { "lang": "en", "value": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service." }, { "lang": "es", "value": "Se encontr\u00f3 una falla en la Red Virtual Abierta (OVN). En los cl\u00fasteres OVN donde se utiliza BFD entre hipervisores para alta disponibilidad, un atacante puede inyectar paquetes BFD especialmente manipulados desde cargas de trabajo sin privilegios, incluidas m\u00e1quinas virtuales o contenedores, que pueden desencadenar una denegaci\u00f3n de servicio." } ], "id": "CVE-2024-2182", "lastModified": "2024-03-23T03:15:12.333", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "secalert@redhat.com", "type": "Secondary" } ] }, "published": "2024-03-12T17:15:59.190", "references": [ { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:1385" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:1386" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:1387" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:1388" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:1390" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:1391" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:1392" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:1393" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:1394" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/security/cve/CVE-2024-2182" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840" }, { "source": "secalert@redhat.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APR4GCVCMQD3DQUKXDNGIXCCYGE5V7IT/" }, { "source": "secalert@redhat.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CB4N522FCS4XWAPUKRWZF6QZ657FCIDF/" }, { "source": "secalert@redhat.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRKXOOOKD56TY3JQVB45N3GCTX3EG4BV/" }, { "source": "secalert@redhat.com", "url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html" }, { "source": "secalert@redhat.com", "url": "https://www.openwall.com/lists/oss-security/2024/03/12/5" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-346" } ], "source": "secalert@redhat.com", "type": "Secondary" } ] } } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.