Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2021:0931 - Security Advisory
Issued:
2021-03-18
Updated:
2021-03-18

RHSA-2021:0931 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: openvswitch2.11 and ovn2.11 security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for openvswitch2.11 and ovn2.11 is now available for Red Hat
OpenStack Platform 13 (Queens).

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

Description

Open vSwitch provides standard network bridging functions and support for
the OpenFlow protocol for remote per-flow control of traffic.

OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups.

Security Fix(es):

  • buffer overflow in the lldp_decode function in daemon/protocols/lldp.c

(CVE-2015-8011)

  • librte_vhost Integer overflow in vhost_user_set_log_base()

(CVE-2020-10722)

  • librte_vhost Integer truncation in

vhost_user_check_and_alloc_queue_pair() (CVE-2020-10723)

  • librte_vhost Missing inputs validation in Vhost-crypto (CVE-2020-10724)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.

Solution

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat OpenStack for IBM Power 13 ppc64le
  • Red Hat OpenStack 13 x86_64
  • Red Hat OpenStack Director Deployment Tools 13 x86_64
  • Red Hat OpenStack Director Deployment Tools for IBM Power LE 13 ppc64le

Fixes

  • BZ - 1828867 - CVE-2020-10722 dpdk: librte_vhost Integer overflow in vhost_user_set_log_base()
  • BZ - 1828874 - CVE-2020-10723 dpdk: librte_vhost Integer truncation in vhost_user_check_and_alloc_queue_pair()
  • BZ - 1828884 - CVE-2020-10724 dpdk: librte_vhost Missing inputs validation in Vhost-crypto
  • BZ - 1896536 - CVE-2015-8011 lldpd: buffer overflow in the lldp_decode function in daemon/protocols/lldp.c
  • BZ - 1905246 - Include latest FDP release in RHOSP 13z15

CVEs

  • CVE-2015-8011
  • CVE-2020-10722
  • CVE-2020-10723
  • CVE-2020-10724

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat OpenStack for IBM Power 13

SRPM
openvswitch-selinux-extra-policy-1.0-17.el7fdp.src.rpm SHA-256: a583d0f7efca4c1a8771d2bd96835b07caae341e2c57ed34d04fcb945c0d4ab9
openvswitch2.11-2.11.3-77.el7fdp.src.rpm SHA-256: ff8cbedc220468f54c28d81ffd737977203e803958f191f7a0c8e4a958585698
ovn2.11-2.11.1-57.el7fdp.src.rpm SHA-256: 02604d72b3a003e232633aa84bd39a483eb49e2cd78d323159ecdd7695acde94
ppc64le
openvswitch-selinux-extra-policy-1.0-17.el7fdp.noarch.rpm SHA-256: 11499018eeb2cec79a54a4b1a32e22e4b03d373457d525a02f049e462c286f66
openvswitch2.11-2.11.3-77.el7fdp.ppc64le.rpm SHA-256: 29acc90d212a86f87824616f51fe05bb81343ba5015b3416925f196380ca9da3
openvswitch2.11-debuginfo-2.11.3-77.el7fdp.ppc64le.rpm SHA-256: 91ea7d7d7120e2c1d5dd365cd4da8065365b0e51ebcc3e5af8a2f6b062982f35
openvswitch2.11-devel-2.11.3-77.el7fdp.ppc64le.rpm SHA-256: 9dfaeda39313d779ad4df788aa91375311b633c18d6a94b6c72116eaee2e8a2c
openvswitch2.11-test-2.11.3-77.el7fdp.noarch.rpm SHA-256: 9068cfc61fcae4104c62b45e3eb9edf4bfe825ebeb789cc702232a51d462bf5a
ovn2.11-2.11.1-57.el7fdp.ppc64le.rpm SHA-256: 3fd239d3a5ec496e3044db7b04bb507ea9a0ded3c2c7816f441b9db09a1a0fd8
ovn2.11-central-2.11.1-57.el7fdp.ppc64le.rpm SHA-256: 8a0c942ba41948630353defc0152c3581ee0881b6196a3a783a761bd641a5680
ovn2.11-debuginfo-2.11.1-57.el7fdp.ppc64le.rpm SHA-256: 13d081edb3ee5f165891b4ce888dba480a289f8e0278268033d3fc3d8364ed98
ovn2.11-host-2.11.1-57.el7fdp.ppc64le.rpm SHA-256: 572baac42b8582260c50568ec031166cfc2162e3df830421b2c5c7e815f8a4d4
ovn2.11-vtep-2.11.1-57.el7fdp.ppc64le.rpm SHA-256: a5f216535c799d17ad78cdb6c713af04f1b9edaab5e4d38ff96c7099756db5ea
python-openvswitch2.11-2.11.3-77.el7fdp.ppc64le.rpm SHA-256: 2b97943d0ff6b649336c1c53529f11c07df8d50f8491fb34086c41d31a559a47

Red Hat OpenStack 13

SRPM
openvswitch-selinux-extra-policy-1.0-17.el7fdp.src.rpm SHA-256: a583d0f7efca4c1a8771d2bd96835b07caae341e2c57ed34d04fcb945c0d4ab9
openvswitch2.11-2.11.3-77.el7fdp.src.rpm SHA-256: ff8cbedc220468f54c28d81ffd737977203e803958f191f7a0c8e4a958585698
ovn2.11-2.11.1-57.el7fdp.src.rpm SHA-256: 02604d72b3a003e232633aa84bd39a483eb49e2cd78d323159ecdd7695acde94
x86_64
openvswitch-selinux-extra-policy-1.0-17.el7fdp.noarch.rpm SHA-256: 11499018eeb2cec79a54a4b1a32e22e4b03d373457d525a02f049e462c286f66
openvswitch2.11-2.11.3-77.el7fdp.x86_64.rpm SHA-256: 7580dc6104a000c2882513cb8b46934af682e484827390f32b19d0dc03de8191
openvswitch2.11-debuginfo-2.11.3-77.el7fdp.x86_64.rpm SHA-256: 54985eaa2869fea3845724e9b6bc71651859d6b0c351bb7400e31e5ddee60223
openvswitch2.11-devel-2.11.3-77.el7fdp.x86_64.rpm SHA-256: 1db8ba803ceccea56d69a81af9a5b025d5decc82a22fce6954ade70e672d9be3
openvswitch2.11-test-2.11.3-77.el7fdp.noarch.rpm SHA-256: 9068cfc61fcae4104c62b45e3eb9edf4bfe825ebeb789cc702232a51d462bf5a
ovn2.11-2.11.1-57.el7fdp.x86_64.rpm SHA-256: 8fe025337a661f855afaf5e0e0486b6fafc7e0546dd5c700855b26bfa5b67fa2
ovn2.11-central-2.11.1-57.el7fdp.x86_64.rpm SHA-256: 668677b4a736f26c65c56a39c12d70055213aa9dbfa0942979763f9b48207ae2
ovn2.11-debuginfo-2.11.1-57.el7fdp.x86_64.rpm SHA-256: a95606caff994a4366a50c509120ce089ea8f924bbe8961301035d9ce046b280
ovn2.11-host-2.11.1-57.el7fdp.x86_64.rpm SHA-256: bf8f2a3c0091301fd87ef5a80459b1b0a372f2ffb26852ca60522076d5084637
ovn2.11-vtep-2.11.1-57.el7fdp.x86_64.rpm SHA-256: f83635f593cbb93cb14ce0c224a2052cf868d79af1d798076f6590b81fc478f8
python-openvswitch2.11-2.11.3-77.el7fdp.x86_64.rpm SHA-256: 5ae62b74bb59a17867b1006e4464a3367fa97396e2c62ae6f7d78197c6c7c7d2

Red Hat OpenStack Director Deployment Tools 13

SRPM
openvswitch-selinux-extra-policy-1.0-17.el7fdp.src.rpm SHA-256: a583d0f7efca4c1a8771d2bd96835b07caae341e2c57ed34d04fcb945c0d4ab9
x86_64
openvswitch-selinux-extra-policy-1.0-17.el7fdp.noarch.rpm SHA-256: 11499018eeb2cec79a54a4b1a32e22e4b03d373457d525a02f049e462c286f66

Red Hat OpenStack Director Deployment Tools for IBM Power LE 13

SRPM
openvswitch-selinux-extra-policy-1.0-17.el7fdp.src.rpm SHA-256: a583d0f7efca4c1a8771d2bd96835b07caae341e2c57ed34d04fcb945c0d4ab9
ppc64le
openvswitch-selinux-extra-policy-1.0-17.el7fdp.noarch.rpm SHA-256: 11499018eeb2cec79a54a4b1a32e22e4b03d373457d525a02f049e462c286f66

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
2023
  • Privacy Statement
  • Terms of Use
  • All Policies and Guidelines
We've updated our Privacy Statement effective September 15, 2023.
Red Hat Summit Red Hat Summit
Twitter