Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-2182 (GCVE-0-2024-2182)
Vulnerability from cvelistv5 – Published: 2024-03-12 16:18 – Updated: 2025-11-08 07:11
VLAI?
EPSS
Title
Ovn: insufficient validation of bfd packets may lead to denial of service
Summary
A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.
Severity ?
6.5 (Medium)
CWE
- CWE-346 - Origin Validation Error
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Affected:
20.03.0 , < *
(semver)
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Red Hat would like to thank Frode Nordahl (Canonical) for reporting this issue.
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-2182",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-03-13T14:24:40.610508Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-15T15:26:18.815Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T19:03:39.232Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2024/03/12/5"
},
{
"name": "RHSA-2024:1385",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2024:1385"
},
{
"name": "RHSA-2024:1386",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2024:1386"
},
{
"name": "RHSA-2024:1387",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2024:1387"
},
{
"name": "RHSA-2024:1388",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2024:1388"
},
{
"name": "RHSA-2024:1390",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2024:1390"
},
{
"name": "RHSA-2024:1391",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2024:1391"
},
{
"name": "RHSA-2024:1392",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2024:1392"
},
{
"name": "RHSA-2024:1393",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2024:1393"
},
{
"name": "RHSA-2024:1394",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2024:1394"
},
{
"name": "RHSA-2024:4035",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2024:4035"
},
{
"tags": [
"vdb-entry",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"name": "RHBZ#2267840",
"tags": [
"issue-tracking",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APR4GCVCMQD3DQUKXDNGIXCCYGE5V7IT/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CB4N522FCS4XWAPUKRWZF6QZ657FCIDF/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRKXOOOKD56TY3JQVB45N3GCTX3EG4BV/"
},
{
"tags": [
"x_transferred"
],
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://www.github.com/ovn-org/ovn/",
"defaultStatus": "unaffected",
"packageName": "ovn",
"versions": [
{
"lessThan": "*",
"status": "affected",
"version": "20.03.0",
"versionType": "semver"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
],
"defaultStatus": "affected",
"packageName": "ovn23.06",
"product": "Fast Datapath for Red Hat Enterprise Linux 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:23.06.1-112.el8fdp",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
],
"defaultStatus": "affected",
"packageName": "ovn22.12",
"product": "Fast Datapath for Red Hat Enterprise Linux 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:22.12.1-94.el8fdp",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
],
"defaultStatus": "affected",
"packageName": "ovn22.03",
"product": "Fast Datapath for Red Hat Enterprise Linux 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:22.03.3-71.el8fdp",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
],
"defaultStatus": "affected",
"packageName": "ovn23.03",
"product": "Fast Datapath for Red Hat Enterprise Linux 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:23.03.1-100.el8fdp",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
],
"defaultStatus": "affected",
"packageName": "ovn-2021",
"product": "Fast Datapath for Red Hat Enterprise Linux 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:21.12.0-142.el8fdp",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
],
"defaultStatus": "affected",
"packageName": "ovn23.09",
"product": "Fast Datapath for Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:23.09.0-136.el9fdp",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
],
"defaultStatus": "affected",
"packageName": "ovn23.06",
"product": "Fast Datapath for Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:23.06.1-112.el9fdp",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
],
"defaultStatus": "affected",
"packageName": "ovn22.12",
"product": "Fast Datapath for Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:22.12.1-94.el9fdp",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
],
"defaultStatus": "affected",
"packageName": "ovn22.03",
"product": "Fast Datapath for Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:22.03.3-71.el9fdp",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
],
"defaultStatus": "affected",
"packageName": "ovn23.03",
"product": "Fast Datapath for Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:23.03.1-100.el9fdp",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:7::fastdatapath"
],
"defaultStatus": "unknown",
"packageName": "ovn2.11",
"product": "Fast Datapath for RHEL 7",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:7::fastdatapath"
],
"defaultStatus": "unknown",
"packageName": "ovn2.12",
"product": "Fast Datapath for RHEL 7",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:7::fastdatapath"
],
"defaultStatus": "unknown",
"packageName": "ovn2.13",
"product": "Fast Datapath for RHEL 7",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
],
"defaultStatus": "unknown",
"packageName": "ovn2.11",
"product": "Fast Datapath for RHEL 8",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
],
"defaultStatus": "unknown",
"packageName": "ovn2.12",
"product": "Fast Datapath for RHEL 8",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
],
"defaultStatus": "unknown",
"packageName": "ovn2.13",
"product": "Fast Datapath for RHEL 8",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
],
"defaultStatus": "unknown",
"packageName": "ovn22.06",
"product": "Fast Datapath for RHEL 8",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
],
"defaultStatus": "unknown",
"packageName": "ovn22.09",
"product": "Fast Datapath for RHEL 8",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
],
"defaultStatus": "affected",
"packageName": "ovn-2021",
"product": "Fast Datapath for RHEL 9",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
],
"defaultStatus": "unknown",
"packageName": "ovn22.06",
"product": "Fast Datapath for RHEL 9",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
],
"defaultStatus": "unknown",
"packageName": "ovn22.09",
"product": "Fast Datapath for RHEL 9",
"vendor": "Red Hat"
}
],
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Frode Nordahl (Canonical) for reporting this issue."
}
],
"datePublic": "2024-03-12T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service."
}
],
"metrics": [
{
"other": {
"content": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"value": "Moderate"
},
"type": "Red Hat severity rating"
}
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-346",
"description": "Origin Validation Error",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-08T07:11:46.026Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2024:1385",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2024:1385"
},
{
"name": "RHSA-2024:1386",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2024:1386"
},
{
"name": "RHSA-2024:1387",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2024:1387"
},
{
"name": "RHSA-2024:1388",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2024:1388"
},
{
"name": "RHSA-2024:1390",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2024:1390"
},
{
"name": "RHSA-2024:1391",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2024:1391"
},
{
"name": "RHSA-2024:1392",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2024:1392"
},
{
"name": "RHSA-2024:1393",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2024:1393"
},
{
"name": "RHSA-2024:1394",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2024:1394"
},
{
"name": "RHSA-2024:4035",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2024:4035"
},
{
"tags": [
"vdb-entry",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"name": "RHBZ#2267840",
"tags": [
"issue-tracking",
"x_refsource_REDHAT"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-03-04T00:00:00+00:00",
"value": "Reported to Red Hat."
},
{
"lang": "en",
"time": "2024-03-12T00:00:00+00:00",
"value": "Made public."
}
],
"title": "Ovn: insufficient validation of bfd packets may lead to denial of service",
"x_redhatCweChain": "CWE-346: Origin Validation Error"
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2024-2182",
"datePublished": "2024-03-12T16:18:31.829Z",
"dateReserved": "2024-03-05T00:40:55.429Z",
"dateUpdated": "2025-11-08T07:11:46.026Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.\"}, {\"lang\": \"es\", \"value\": \"Se encontr\\u00f3 una falla en la Red Virtual Abierta (OVN). En los cl\\u00fasteres OVN donde se utiliza BFD entre hipervisores para alta disponibilidad, un atacante puede inyectar paquetes BFD especialmente manipulados desde cargas de trabajo sin privilegios, incluidas m\\u00e1quinas virtuales o contenedores, que pueden desencadenar una denegaci\\u00f3n de servicio.\"}]",
"id": "CVE-2024-2182",
"lastModified": "2024-11-21T09:09:12.320",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"secalert@redhat.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}]}",
"published": "2024-03-12T17:15:59.190",
"references": "[{\"url\": \"https://access.redhat.com/errata/RHSA-2024:1385\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1386\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1387\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1388\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1390\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1391\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1392\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1393\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1394\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:4035\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2024-2182\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2267840\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://www.openwall.com/lists/oss-security/2024/03/12/5\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2024/03/12/5\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1385\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1386\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1387\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1388\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1390\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1391\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1392\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1393\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1394\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:4035\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2024-2182\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2267840\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APR4GCVCMQD3DQUKXDNGIXCCYGE5V7IT/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CB4N522FCS4XWAPUKRWZF6QZ657FCIDF/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRKXOOOKD56TY3JQVB45N3GCTX3EG4BV/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.openwall.com/lists/oss-security/2024/03/12/5\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"secalert@redhat.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-346\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-2182\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2024-03-12T17:15:59.190\",\"lastModified\":\"2024-11-21T09:09:12.320\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 una falla en la Red Virtual Abierta (OVN). En los cl\u00fasteres OVN donde se utiliza BFD entre hipervisores para alta disponibilidad, un atacante puede inyectar paquetes BFD especialmente manipulados desde cargas de trabajo sin privilegios, incluidas m\u00e1quinas virtuales o contenedores, que pueden desencadenar una denegaci\u00f3n de servicio.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-346\"}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1385\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1386\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1387\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1388\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1390\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1391\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1392\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1393\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1394\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:4035\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2024-2182\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2267840\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.openwall.com/lists/oss-security/2024/03/12/5\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/03/12/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1385\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1386\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1387\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1388\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1390\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1391\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1392\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1393\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1394\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:4035\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2024-2182\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2267840\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APR4GCVCMQD3DQUKXDNGIXCCYGE5V7IT/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CB4N522FCS4XWAPUKRWZF6QZ657FCIDF/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRKXOOOKD56TY3JQVB45N3GCTX3EG4BV/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.openwall.com/lists/oss-security/2024/03/12/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2024/03/12/5\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1385\", \"name\": \"RHSA-2024:1385\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1386\", \"name\": \"RHSA-2024:1386\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1387\", \"name\": \"RHSA-2024:1387\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1388\", \"name\": \"RHSA-2024:1388\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1390\", \"name\": \"RHSA-2024:1390\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1391\", \"name\": \"RHSA-2024:1391\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1392\", \"name\": \"RHSA-2024:1392\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1393\", \"name\": \"RHSA-2024:1393\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1394\", \"name\": \"RHSA-2024:1394\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:4035\", \"name\": \"RHSA-2024:4035\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2024-2182\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2267840\", \"name\": \"RHBZ#2267840\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APR4GCVCMQD3DQUKXDNGIXCCYGE5V7IT/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CB4N522FCS4XWAPUKRWZF6QZ657FCIDF/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRKXOOOKD56TY3JQVB45N3GCTX3EG4BV/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.openwall.com/lists/oss-security/2024/03/12/5\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T19:03:39.232Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-2182\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-03-13T14:24:40.610508Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-05T15:20:42.588Z\"}}], \"cna\": {\"title\": \"Ovn: insufficient validation of bfd packets may lead to denial of service\", \"credits\": [{\"lang\": \"en\", \"value\": \"Red Hat would like to thank Frode Nordahl (Canonical) for reporting this issue.\"}], \"metrics\": [{\"other\": {\"type\": \"Red Hat severity rating\", \"content\": {\"value\": \"Moderate\", \"namespace\": \"https://access.redhat.com/security/updates/classification/\"}}}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"versions\": [{\"status\": \"affected\", \"version\": \"20.03.0\", \"lessThan\": \"*\", \"versionType\": \"semver\"}], \"packageName\": \"ovn\", \"collectionURL\": \"https://www.github.com/ovn-org/ovn/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:23.06.1-112.el8fdp\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"ovn23.06\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:22.12.1-94.el8fdp\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"ovn22.12\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:22.03.3-71.el8fdp\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"ovn22.03\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:23.03.1-100.el8fdp\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"ovn23.03\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:21.12.0-142.el8fdp\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"ovn-2021\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:23.09.0-136.el9fdp\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"ovn23.09\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:23.06.1-112.el9fdp\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"ovn23.06\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:22.12.1-94.el9fdp\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"ovn22.12\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:22.03.3-71.el9fdp\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"ovn22.03\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:23.03.1-100.el9fdp\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"ovn23.03\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:7::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for RHEL 7\", \"packageName\": \"ovn2.11\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:7::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for RHEL 7\", \"packageName\": \"ovn2.12\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:7::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for RHEL 7\", \"packageName\": \"ovn2.13\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for RHEL 8\", \"packageName\": \"ovn2.11\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for RHEL 8\", \"packageName\": \"ovn2.12\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for RHEL 8\", \"packageName\": \"ovn2.13\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for RHEL 8\", \"packageName\": \"ovn22.06\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for RHEL 8\", \"packageName\": \"ovn22.09\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for RHEL 9\", \"packageName\": \"ovn-2021\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for RHEL 9\", \"packageName\": \"ovn22.06\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for RHEL 9\", \"packageName\": \"ovn22.09\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2024-03-04T00:00:00+00:00\", \"value\": \"Reported to Red Hat.\"}, {\"lang\": \"en\", \"time\": \"2024-03-12T00:00:00+00:00\", \"value\": \"Made public.\"}], \"datePublic\": \"2024-03-12T00:00:00.000Z\", \"references\": [{\"url\": \"https://access.redhat.com/errata/RHSA-2024:1385\", \"name\": \"RHSA-2024:1385\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1386\", \"name\": \"RHSA-2024:1386\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1387\", \"name\": \"RHSA-2024:1387\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1388\", \"name\": \"RHSA-2024:1388\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1390\", \"name\": \"RHSA-2024:1390\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1391\", \"name\": \"RHSA-2024:1391\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1392\", \"name\": \"RHSA-2024:1392\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1393\", \"name\": \"RHSA-2024:1393\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1394\", \"name\": \"RHSA-2024:1394\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:4035\", \"name\": \"RHSA-2024:4035\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2024-2182\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2267840\", \"name\": \"RHBZ#2267840\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html\"}, {\"url\": \"https://www.openwall.com/lists/oss-security/2024/03/12/5\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-346\", \"description\": \"Origin Validation Error\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2025-11-08T07:11:46.026Z\"}, \"x_redhatCweChain\": \"CWE-346: Origin Validation Error\"}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-2182\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-08T07:11:46.026Z\", \"dateReserved\": \"2024-03-05T00:40:55.429Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2024-03-12T16:18:31.829Z\", \"assignerShortName\": \"redhat\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
RHSA-2024:1390
Vulnerability from csaf_redhat - Published: 2024-03-19 15:46 - Updated: 2025-11-21 18:57Summary
Red Hat Security Advisory: ovn23.09 security update
Notes
Topic
An update for ovn23.09 is now available in Fast Datapath for Red Hat
Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn23.09: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ovn23.09 is now available in Fast Datapath for Red Hat\nEnterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn23.09: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1390",
"url": "https://access.redhat.com/errata/RHSA-2024:1390"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1390.json"
}
],
"title": "Red Hat Security Advisory: ovn23.09 security update",
"tracking": {
"current_release_date": "2025-11-21T18:57:26+00:00",
"generator": {
"date": "2025-11-21T18:57:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:1390",
"initial_release_date": "2024-03-19T15:46:14+00:00",
"revision_history": [
{
"date": "2024-03-19T15:46:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-03-19T15:46:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:57:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product": {
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::fastdatapath"
}
}
}
],
"category": "product_family",
"name": "Fast Datapath"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.09-0:23.09.0-136.el9fdp.src",
"product": {
"name": "ovn23.09-0:23.09.0-136.el9fdp.src",
"product_id": "ovn23.09-0:23.09.0-136.el9fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09@23.09.0-136.el9fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.09-0:23.09.0-136.el9fdp.x86_64",
"product": {
"name": "ovn23.09-0:23.09.0-136.el9fdp.x86_64",
"product_id": "ovn23.09-0:23.09.0-136.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09@23.09.0-136.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-central-0:23.09.0-136.el9fdp.x86_64",
"product": {
"name": "ovn23.09-central-0:23.09.0-136.el9fdp.x86_64",
"product_id": "ovn23.09-central-0:23.09.0-136.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-central@23.09.0-136.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-host-0:23.09.0-136.el9fdp.x86_64",
"product": {
"name": "ovn23.09-host-0:23.09.0-136.el9fdp.x86_64",
"product_id": "ovn23.09-host-0:23.09.0-136.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-host@23.09.0-136.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.x86_64",
"product": {
"name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.x86_64",
"product_id": "ovn23.09-vtep-0:23.09.0-136.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-vtep@23.09.0-136.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.x86_64",
"product": {
"name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.x86_64",
"product_id": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-debugsource@23.09.0-136.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"product": {
"name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"product_id": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-central-debuginfo@23.09.0-136.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"product": {
"name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"product_id": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-debuginfo@23.09.0-136.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"product": {
"name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"product_id": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-host-debuginfo@23.09.0-136.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"product": {
"name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"product_id": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-vtep-debuginfo@23.09.0-136.el9fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.09-0:23.09.0-136.el9fdp.ppc64le",
"product": {
"name": "ovn23.09-0:23.09.0-136.el9fdp.ppc64le",
"product_id": "ovn23.09-0:23.09.0-136.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09@23.09.0-136.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-central-0:23.09.0-136.el9fdp.ppc64le",
"product": {
"name": "ovn23.09-central-0:23.09.0-136.el9fdp.ppc64le",
"product_id": "ovn23.09-central-0:23.09.0-136.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-central@23.09.0-136.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-host-0:23.09.0-136.el9fdp.ppc64le",
"product": {
"name": "ovn23.09-host-0:23.09.0-136.el9fdp.ppc64le",
"product_id": "ovn23.09-host-0:23.09.0-136.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-host@23.09.0-136.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.ppc64le",
"product": {
"name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.ppc64le",
"product_id": "ovn23.09-vtep-0:23.09.0-136.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-vtep@23.09.0-136.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.ppc64le",
"product": {
"name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.ppc64le",
"product_id": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-debugsource@23.09.0-136.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"product": {
"name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"product_id": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-central-debuginfo@23.09.0-136.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"product": {
"name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"product_id": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-debuginfo@23.09.0-136.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"product": {
"name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"product_id": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-host-debuginfo@23.09.0-136.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"product": {
"name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"product_id": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-vtep-debuginfo@23.09.0-136.el9fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.09-0:23.09.0-136.el9fdp.aarch64",
"product": {
"name": "ovn23.09-0:23.09.0-136.el9fdp.aarch64",
"product_id": "ovn23.09-0:23.09.0-136.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09@23.09.0-136.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-central-0:23.09.0-136.el9fdp.aarch64",
"product": {
"name": "ovn23.09-central-0:23.09.0-136.el9fdp.aarch64",
"product_id": "ovn23.09-central-0:23.09.0-136.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-central@23.09.0-136.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-host-0:23.09.0-136.el9fdp.aarch64",
"product": {
"name": "ovn23.09-host-0:23.09.0-136.el9fdp.aarch64",
"product_id": "ovn23.09-host-0:23.09.0-136.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-host@23.09.0-136.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.aarch64",
"product": {
"name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.aarch64",
"product_id": "ovn23.09-vtep-0:23.09.0-136.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-vtep@23.09.0-136.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.aarch64",
"product": {
"name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.aarch64",
"product_id": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-debugsource@23.09.0-136.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"product": {
"name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"product_id": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-central-debuginfo@23.09.0-136.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"product": {
"name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"product_id": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-debuginfo@23.09.0-136.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"product": {
"name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"product_id": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-host-debuginfo@23.09.0-136.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"product": {
"name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"product_id": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-vtep-debuginfo@23.09.0-136.el9fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.09-0:23.09.0-136.el9fdp.s390x",
"product": {
"name": "ovn23.09-0:23.09.0-136.el9fdp.s390x",
"product_id": "ovn23.09-0:23.09.0-136.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09@23.09.0-136.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-central-0:23.09.0-136.el9fdp.s390x",
"product": {
"name": "ovn23.09-central-0:23.09.0-136.el9fdp.s390x",
"product_id": "ovn23.09-central-0:23.09.0-136.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-central@23.09.0-136.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-host-0:23.09.0-136.el9fdp.s390x",
"product": {
"name": "ovn23.09-host-0:23.09.0-136.el9fdp.s390x",
"product_id": "ovn23.09-host-0:23.09.0-136.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-host@23.09.0-136.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.s390x",
"product": {
"name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.s390x",
"product_id": "ovn23.09-vtep-0:23.09.0-136.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-vtep@23.09.0-136.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.s390x",
"product": {
"name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.s390x",
"product_id": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-debugsource@23.09.0-136.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.s390x",
"product": {
"name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.s390x",
"product_id": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-central-debuginfo@23.09.0-136.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.s390x",
"product": {
"name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.s390x",
"product_id": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-debuginfo@23.09.0-136.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.s390x",
"product": {
"name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.s390x",
"product_id": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-host-debuginfo@23.09.0-136.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.s390x",
"product": {
"name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.s390x",
"product_id": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-vtep-debuginfo@23.09.0-136.el9fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-0:23.09.0-136.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.aarch64"
},
"product_reference": "ovn23.09-0:23.09.0-136.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-0:23.09.0-136.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.ppc64le"
},
"product_reference": "ovn23.09-0:23.09.0-136.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-0:23.09.0-136.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.s390x"
},
"product_reference": "ovn23.09-0:23.09.0-136.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-0:23.09.0-136.el9fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.src"
},
"product_reference": "ovn23.09-0:23.09.0-136.el9fdp.src",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-0:23.09.0-136.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.x86_64"
},
"product_reference": "ovn23.09-0:23.09.0-136.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-central-0:23.09.0-136.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.aarch64"
},
"product_reference": "ovn23.09-central-0:23.09.0-136.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-central-0:23.09.0-136.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.ppc64le"
},
"product_reference": "ovn23.09-central-0:23.09.0-136.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-central-0:23.09.0-136.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.s390x"
},
"product_reference": "ovn23.09-central-0:23.09.0-136.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-central-0:23.09.0-136.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.x86_64"
},
"product_reference": "ovn23.09-central-0:23.09.0-136.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.aarch64"
},
"product_reference": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.ppc64le"
},
"product_reference": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.s390x"
},
"product_reference": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.x86_64"
},
"product_reference": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.aarch64"
},
"product_reference": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.ppc64le"
},
"product_reference": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.s390x"
},
"product_reference": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.x86_64"
},
"product_reference": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.aarch64"
},
"product_reference": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.ppc64le"
},
"product_reference": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.s390x"
},
"product_reference": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.x86_64"
},
"product_reference": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-host-0:23.09.0-136.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.aarch64"
},
"product_reference": "ovn23.09-host-0:23.09.0-136.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-host-0:23.09.0-136.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.ppc64le"
},
"product_reference": "ovn23.09-host-0:23.09.0-136.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-host-0:23.09.0-136.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.s390x"
},
"product_reference": "ovn23.09-host-0:23.09.0-136.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-host-0:23.09.0-136.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.x86_64"
},
"product_reference": "ovn23.09-host-0:23.09.0-136.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.aarch64"
},
"product_reference": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.ppc64le"
},
"product_reference": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.s390x"
},
"product_reference": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.x86_64"
},
"product_reference": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.aarch64"
},
"product_reference": "ovn23.09-vtep-0:23.09.0-136.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.ppc64le"
},
"product_reference": "ovn23.09-vtep-0:23.09.0-136.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.s390x"
},
"product_reference": "ovn23.09-vtep-0:23.09.0-136.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.x86_64"
},
"product_reference": "ovn23.09-vtep-0:23.09.0-136.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.aarch64"
},
"product_reference": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.ppc64le"
},
"product_reference": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.s390x"
},
"product_reference": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.x86_64"
},
"product_reference": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Frode Nordahl"
],
"organization": "Canonical"
}
],
"cve": "CVE-2024-2182",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2024-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: insufficient validation of BFD packets may lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.src",
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"category": "external",
"summary": "RHBZ#2267840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2182"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182"
},
{
"category": "external",
"summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html",
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5",
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
}
],
"release_date": "2024-03-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:46:14+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.src",
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1390"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.src",
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ovn: insufficient validation of BFD packets may lead to denial of service"
}
]
}
RHSA-2024:1394
Vulnerability from csaf_redhat - Published: 2024-03-19 15:46 - Updated: 2025-11-21 18:57Summary
Red Hat Security Advisory: ovn23.03 security update
Notes
Topic
An update for ovn23.03 is now available in Fast Datapath for Red Hat
Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn23.03: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ovn23.03 is now available in Fast Datapath for Red Hat\nEnterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn23.03: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1394",
"url": "https://access.redhat.com/errata/RHSA-2024:1394"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1394.json"
}
],
"title": "Red Hat Security Advisory: ovn23.03 security update",
"tracking": {
"current_release_date": "2025-11-21T18:57:28+00:00",
"generator": {
"date": "2025-11-21T18:57:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:1394",
"initial_release_date": "2024-03-19T15:46:57+00:00",
"revision_history": [
{
"date": "2024-03-19T15:46:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-03-19T15:46:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:57:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product": {
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::fastdatapath"
}
}
}
],
"category": "product_family",
"name": "Fast Datapath"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.03-0:23.03.1-100.el9fdp.src",
"product": {
"name": "ovn23.03-0:23.03.1-100.el9fdp.src",
"product_id": "ovn23.03-0:23.03.1-100.el9fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el9fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.03-0:23.03.1-100.el9fdp.x86_64",
"product": {
"name": "ovn23.03-0:23.03.1-100.el9fdp.x86_64",
"product_id": "ovn23.03-0:23.03.1-100.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-0:23.03.1-100.el9fdp.x86_64",
"product": {
"name": "ovn23.03-central-0:23.03.1-100.el9fdp.x86_64",
"product_id": "ovn23.03-central-0:23.03.1-100.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central@23.03.1-100.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-0:23.03.1-100.el9fdp.x86_64",
"product": {
"name": "ovn23.03-host-0:23.03.1-100.el9fdp.x86_64",
"product_id": "ovn23.03-host-0:23.03.1-100.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host@23.03.1-100.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.x86_64",
"product": {
"name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.x86_64",
"product_id": "ovn23.03-vtep-0:23.03.1-100.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep@23.03.1-100.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.x86_64",
"product": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.x86_64",
"product_id": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debugsource@23.03.1-100.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"product": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"product_id": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central-debuginfo@23.03.1-100.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"product": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"product_id": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debuginfo@23.03.1-100.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"product": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"product_id": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host-debuginfo@23.03.1-100.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"product": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"product_id": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep-debuginfo@23.03.1-100.el9fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.03-0:23.03.1-100.el9fdp.ppc64le",
"product": {
"name": "ovn23.03-0:23.03.1-100.el9fdp.ppc64le",
"product_id": "ovn23.03-0:23.03.1-100.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-0:23.03.1-100.el9fdp.ppc64le",
"product": {
"name": "ovn23.03-central-0:23.03.1-100.el9fdp.ppc64le",
"product_id": "ovn23.03-central-0:23.03.1-100.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central@23.03.1-100.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-0:23.03.1-100.el9fdp.ppc64le",
"product": {
"name": "ovn23.03-host-0:23.03.1-100.el9fdp.ppc64le",
"product_id": "ovn23.03-host-0:23.03.1-100.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host@23.03.1-100.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.ppc64le",
"product": {
"name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.ppc64le",
"product_id": "ovn23.03-vtep-0:23.03.1-100.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep@23.03.1-100.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.ppc64le",
"product": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.ppc64le",
"product_id": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debugsource@23.03.1-100.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"product": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"product_id": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central-debuginfo@23.03.1-100.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"product": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"product_id": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debuginfo@23.03.1-100.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"product": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"product_id": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host-debuginfo@23.03.1-100.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"product": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"product_id": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep-debuginfo@23.03.1-100.el9fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.03-0:23.03.1-100.el9fdp.aarch64",
"product": {
"name": "ovn23.03-0:23.03.1-100.el9fdp.aarch64",
"product_id": "ovn23.03-0:23.03.1-100.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-0:23.03.1-100.el9fdp.aarch64",
"product": {
"name": "ovn23.03-central-0:23.03.1-100.el9fdp.aarch64",
"product_id": "ovn23.03-central-0:23.03.1-100.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central@23.03.1-100.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-0:23.03.1-100.el9fdp.aarch64",
"product": {
"name": "ovn23.03-host-0:23.03.1-100.el9fdp.aarch64",
"product_id": "ovn23.03-host-0:23.03.1-100.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host@23.03.1-100.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.aarch64",
"product": {
"name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.aarch64",
"product_id": "ovn23.03-vtep-0:23.03.1-100.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep@23.03.1-100.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.aarch64",
"product": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.aarch64",
"product_id": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debugsource@23.03.1-100.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"product": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"product_id": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central-debuginfo@23.03.1-100.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"product": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"product_id": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debuginfo@23.03.1-100.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"product": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"product_id": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host-debuginfo@23.03.1-100.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"product": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"product_id": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep-debuginfo@23.03.1-100.el9fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.03-0:23.03.1-100.el9fdp.s390x",
"product": {
"name": "ovn23.03-0:23.03.1-100.el9fdp.s390x",
"product_id": "ovn23.03-0:23.03.1-100.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-0:23.03.1-100.el9fdp.s390x",
"product": {
"name": "ovn23.03-central-0:23.03.1-100.el9fdp.s390x",
"product_id": "ovn23.03-central-0:23.03.1-100.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central@23.03.1-100.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-0:23.03.1-100.el9fdp.s390x",
"product": {
"name": "ovn23.03-host-0:23.03.1-100.el9fdp.s390x",
"product_id": "ovn23.03-host-0:23.03.1-100.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host@23.03.1-100.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.s390x",
"product": {
"name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.s390x",
"product_id": "ovn23.03-vtep-0:23.03.1-100.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep@23.03.1-100.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.s390x",
"product": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.s390x",
"product_id": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debugsource@23.03.1-100.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.s390x",
"product": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.s390x",
"product_id": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central-debuginfo@23.03.1-100.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.s390x",
"product": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.s390x",
"product_id": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debuginfo@23.03.1-100.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.s390x",
"product": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.s390x",
"product_id": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host-debuginfo@23.03.1-100.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.s390x",
"product": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.s390x",
"product_id": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep-debuginfo@23.03.1-100.el9fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-0:23.03.1-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.aarch64"
},
"product_reference": "ovn23.03-0:23.03.1-100.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-0:23.03.1-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.ppc64le"
},
"product_reference": "ovn23.03-0:23.03.1-100.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-0:23.03.1-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.s390x"
},
"product_reference": "ovn23.03-0:23.03.1-100.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-0:23.03.1-100.el9fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.src"
},
"product_reference": "ovn23.03-0:23.03.1-100.el9fdp.src",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-0:23.03.1-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.x86_64"
},
"product_reference": "ovn23.03-0:23.03.1-100.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-0:23.03.1-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.aarch64"
},
"product_reference": "ovn23.03-central-0:23.03.1-100.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-0:23.03.1-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.ppc64le"
},
"product_reference": "ovn23.03-central-0:23.03.1-100.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-0:23.03.1-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.s390x"
},
"product_reference": "ovn23.03-central-0:23.03.1-100.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-0:23.03.1-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.x86_64"
},
"product_reference": "ovn23.03-central-0:23.03.1-100.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.aarch64"
},
"product_reference": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.ppc64le"
},
"product_reference": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.s390x"
},
"product_reference": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.x86_64"
},
"product_reference": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.aarch64"
},
"product_reference": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.ppc64le"
},
"product_reference": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.s390x"
},
"product_reference": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.x86_64"
},
"product_reference": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.aarch64"
},
"product_reference": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.ppc64le"
},
"product_reference": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.s390x"
},
"product_reference": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.x86_64"
},
"product_reference": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-0:23.03.1-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.aarch64"
},
"product_reference": "ovn23.03-host-0:23.03.1-100.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-0:23.03.1-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.ppc64le"
},
"product_reference": "ovn23.03-host-0:23.03.1-100.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-0:23.03.1-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.s390x"
},
"product_reference": "ovn23.03-host-0:23.03.1-100.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-0:23.03.1-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.x86_64"
},
"product_reference": "ovn23.03-host-0:23.03.1-100.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.aarch64"
},
"product_reference": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.ppc64le"
},
"product_reference": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.s390x"
},
"product_reference": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.x86_64"
},
"product_reference": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.aarch64"
},
"product_reference": "ovn23.03-vtep-0:23.03.1-100.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.ppc64le"
},
"product_reference": "ovn23.03-vtep-0:23.03.1-100.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.s390x"
},
"product_reference": "ovn23.03-vtep-0:23.03.1-100.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.x86_64"
},
"product_reference": "ovn23.03-vtep-0:23.03.1-100.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.aarch64"
},
"product_reference": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.ppc64le"
},
"product_reference": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.s390x"
},
"product_reference": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.x86_64"
},
"product_reference": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Frode Nordahl"
],
"organization": "Canonical"
}
],
"cve": "CVE-2024-2182",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2024-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: insufficient validation of BFD packets may lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.src",
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"category": "external",
"summary": "RHBZ#2267840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2182"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182"
},
{
"category": "external",
"summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html",
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5",
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
}
],
"release_date": "2024-03-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:46:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.src",
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1394"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.src",
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ovn: insufficient validation of BFD packets may lead to denial of service"
}
]
}
RHSA-2024:1386
Vulnerability from csaf_redhat - Published: 2024-03-19 15:40 - Updated: 2025-11-21 18:57Summary
Red Hat Security Advisory: ovn22.12 security update
Notes
Topic
An update for ovn22.12 is now available in Fast Datapath for Red Hat
Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn22.12: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ovn22.12 is now available in Fast Datapath for Red Hat\nEnterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn22.12: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1386",
"url": "https://access.redhat.com/errata/RHSA-2024:1386"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1386.json"
}
],
"title": "Red Hat Security Advisory: ovn22.12 security update",
"tracking": {
"current_release_date": "2025-11-21T18:57:26+00:00",
"generator": {
"date": "2025-11-21T18:57:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:1386",
"initial_release_date": "2024-03-19T15:40:13+00:00",
"revision_history": [
{
"date": "2024-03-19T15:40:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-03-19T15:40:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:57:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fast Datapath for Red Hat Enterprise Linux 8",
"product": {
"name": "Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::fastdatapath"
}
}
}
],
"category": "product_family",
"name": "Fast Datapath"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.12-0:22.12.1-94.el8fdp.src",
"product": {
"name": "ovn22.12-0:22.12.1-94.el8fdp.src",
"product_id": "ovn22.12-0:22.12.1-94.el8fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el8fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.12-0:22.12.1-94.el8fdp.x86_64",
"product": {
"name": "ovn22.12-0:22.12.1-94.el8fdp.x86_64",
"product_id": "ovn22.12-0:22.12.1-94.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-0:22.12.1-94.el8fdp.x86_64",
"product": {
"name": "ovn22.12-central-0:22.12.1-94.el8fdp.x86_64",
"product_id": "ovn22.12-central-0:22.12.1-94.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central@22.12.1-94.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-0:22.12.1-94.el8fdp.x86_64",
"product": {
"name": "ovn22.12-host-0:22.12.1-94.el8fdp.x86_64",
"product_id": "ovn22.12-host-0:22.12.1-94.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host@22.12.1-94.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.x86_64",
"product": {
"name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.x86_64",
"product_id": "ovn22.12-vtep-0:22.12.1-94.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep@22.12.1-94.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.x86_64",
"product": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.x86_64",
"product_id": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debugsource@22.12.1-94.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"product": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"product_id": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central-debuginfo@22.12.1-94.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"product": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"product_id": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debuginfo@22.12.1-94.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"product": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"product_id": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host-debuginfo@22.12.1-94.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"product": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"product_id": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep-debuginfo@22.12.1-94.el8fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.12-0:22.12.1-94.el8fdp.ppc64le",
"product": {
"name": "ovn22.12-0:22.12.1-94.el8fdp.ppc64le",
"product_id": "ovn22.12-0:22.12.1-94.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-0:22.12.1-94.el8fdp.ppc64le",
"product": {
"name": "ovn22.12-central-0:22.12.1-94.el8fdp.ppc64le",
"product_id": "ovn22.12-central-0:22.12.1-94.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central@22.12.1-94.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-0:22.12.1-94.el8fdp.ppc64le",
"product": {
"name": "ovn22.12-host-0:22.12.1-94.el8fdp.ppc64le",
"product_id": "ovn22.12-host-0:22.12.1-94.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host@22.12.1-94.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.ppc64le",
"product": {
"name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.ppc64le",
"product_id": "ovn22.12-vtep-0:22.12.1-94.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep@22.12.1-94.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.ppc64le",
"product": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.ppc64le",
"product_id": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debugsource@22.12.1-94.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"product": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"product_id": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central-debuginfo@22.12.1-94.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"product": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"product_id": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debuginfo@22.12.1-94.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"product": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"product_id": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host-debuginfo@22.12.1-94.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"product": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"product_id": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep-debuginfo@22.12.1-94.el8fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.12-0:22.12.1-94.el8fdp.aarch64",
"product": {
"name": "ovn22.12-0:22.12.1-94.el8fdp.aarch64",
"product_id": "ovn22.12-0:22.12.1-94.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-0:22.12.1-94.el8fdp.aarch64",
"product": {
"name": "ovn22.12-central-0:22.12.1-94.el8fdp.aarch64",
"product_id": "ovn22.12-central-0:22.12.1-94.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central@22.12.1-94.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-0:22.12.1-94.el8fdp.aarch64",
"product": {
"name": "ovn22.12-host-0:22.12.1-94.el8fdp.aarch64",
"product_id": "ovn22.12-host-0:22.12.1-94.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host@22.12.1-94.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.aarch64",
"product": {
"name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.aarch64",
"product_id": "ovn22.12-vtep-0:22.12.1-94.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep@22.12.1-94.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.aarch64",
"product": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.aarch64",
"product_id": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debugsource@22.12.1-94.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"product": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"product_id": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central-debuginfo@22.12.1-94.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"product": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"product_id": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debuginfo@22.12.1-94.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"product": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"product_id": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host-debuginfo@22.12.1-94.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"product": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"product_id": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep-debuginfo@22.12.1-94.el8fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.12-0:22.12.1-94.el8fdp.s390x",
"product": {
"name": "ovn22.12-0:22.12.1-94.el8fdp.s390x",
"product_id": "ovn22.12-0:22.12.1-94.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-0:22.12.1-94.el8fdp.s390x",
"product": {
"name": "ovn22.12-central-0:22.12.1-94.el8fdp.s390x",
"product_id": "ovn22.12-central-0:22.12.1-94.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central@22.12.1-94.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-0:22.12.1-94.el8fdp.s390x",
"product": {
"name": "ovn22.12-host-0:22.12.1-94.el8fdp.s390x",
"product_id": "ovn22.12-host-0:22.12.1-94.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host@22.12.1-94.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.s390x",
"product": {
"name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.s390x",
"product_id": "ovn22.12-vtep-0:22.12.1-94.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep@22.12.1-94.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.s390x",
"product": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.s390x",
"product_id": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debugsource@22.12.1-94.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.s390x",
"product": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.s390x",
"product_id": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central-debuginfo@22.12.1-94.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.s390x",
"product": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.s390x",
"product_id": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debuginfo@22.12.1-94.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.s390x",
"product": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.s390x",
"product_id": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host-debuginfo@22.12.1-94.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.s390x",
"product": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.s390x",
"product_id": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep-debuginfo@22.12.1-94.el8fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-0:22.12.1-94.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.aarch64"
},
"product_reference": "ovn22.12-0:22.12.1-94.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-0:22.12.1-94.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.ppc64le"
},
"product_reference": "ovn22.12-0:22.12.1-94.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-0:22.12.1-94.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.s390x"
},
"product_reference": "ovn22.12-0:22.12.1-94.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-0:22.12.1-94.el8fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.src"
},
"product_reference": "ovn22.12-0:22.12.1-94.el8fdp.src",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-0:22.12.1-94.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.x86_64"
},
"product_reference": "ovn22.12-0:22.12.1-94.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-0:22.12.1-94.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.aarch64"
},
"product_reference": "ovn22.12-central-0:22.12.1-94.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-0:22.12.1-94.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.ppc64le"
},
"product_reference": "ovn22.12-central-0:22.12.1-94.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-0:22.12.1-94.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.s390x"
},
"product_reference": "ovn22.12-central-0:22.12.1-94.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-0:22.12.1-94.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.x86_64"
},
"product_reference": "ovn22.12-central-0:22.12.1-94.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.aarch64"
},
"product_reference": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.ppc64le"
},
"product_reference": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.s390x"
},
"product_reference": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.x86_64"
},
"product_reference": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.aarch64"
},
"product_reference": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.ppc64le"
},
"product_reference": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.s390x"
},
"product_reference": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.x86_64"
},
"product_reference": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.aarch64"
},
"product_reference": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.ppc64le"
},
"product_reference": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.s390x"
},
"product_reference": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.x86_64"
},
"product_reference": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-0:22.12.1-94.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.aarch64"
},
"product_reference": "ovn22.12-host-0:22.12.1-94.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-0:22.12.1-94.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.ppc64le"
},
"product_reference": "ovn22.12-host-0:22.12.1-94.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-0:22.12.1-94.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.s390x"
},
"product_reference": "ovn22.12-host-0:22.12.1-94.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-0:22.12.1-94.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.x86_64"
},
"product_reference": "ovn22.12-host-0:22.12.1-94.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.aarch64"
},
"product_reference": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.ppc64le"
},
"product_reference": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.s390x"
},
"product_reference": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.x86_64"
},
"product_reference": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.aarch64"
},
"product_reference": "ovn22.12-vtep-0:22.12.1-94.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.ppc64le"
},
"product_reference": "ovn22.12-vtep-0:22.12.1-94.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.s390x"
},
"product_reference": "ovn22.12-vtep-0:22.12.1-94.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.x86_64"
},
"product_reference": "ovn22.12-vtep-0:22.12.1-94.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.aarch64"
},
"product_reference": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.ppc64le"
},
"product_reference": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.s390x"
},
"product_reference": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.x86_64"
},
"product_reference": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Frode Nordahl"
],
"organization": "Canonical"
}
],
"cve": "CVE-2024-2182",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2024-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: insufficient validation of BFD packets may lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.src",
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"category": "external",
"summary": "RHBZ#2267840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2182"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182"
},
{
"category": "external",
"summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html",
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5",
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
}
],
"release_date": "2024-03-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:40:13+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.src",
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1386"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.src",
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ovn: insufficient validation of BFD packets may lead to denial of service"
}
]
}
RHSA-2024:1392
Vulnerability from csaf_redhat - Published: 2024-03-19 15:46 - Updated: 2025-11-21 18:57Summary
Red Hat Security Advisory: ovn22.12 security update
Notes
Topic
An update for ovn22.12 is now available in Fast Datapath for Red Hat
Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn22.12: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ovn22.12 is now available in Fast Datapath for Red Hat\nEnterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn22.12: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1392",
"url": "https://access.redhat.com/errata/RHSA-2024:1392"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1392.json"
}
],
"title": "Red Hat Security Advisory: ovn22.12 security update",
"tracking": {
"current_release_date": "2025-11-21T18:57:28+00:00",
"generator": {
"date": "2025-11-21T18:57:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:1392",
"initial_release_date": "2024-03-19T15:46:20+00:00",
"revision_history": [
{
"date": "2024-03-19T15:46:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-03-19T15:46:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:57:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product": {
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::fastdatapath"
}
}
}
],
"category": "product_family",
"name": "Fast Datapath"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.12-0:22.12.1-94.el9fdp.src",
"product": {
"name": "ovn22.12-0:22.12.1-94.el9fdp.src",
"product_id": "ovn22.12-0:22.12.1-94.el9fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el9fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.12-0:22.12.1-94.el9fdp.x86_64",
"product": {
"name": "ovn22.12-0:22.12.1-94.el9fdp.x86_64",
"product_id": "ovn22.12-0:22.12.1-94.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-0:22.12.1-94.el9fdp.x86_64",
"product": {
"name": "ovn22.12-central-0:22.12.1-94.el9fdp.x86_64",
"product_id": "ovn22.12-central-0:22.12.1-94.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central@22.12.1-94.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-0:22.12.1-94.el9fdp.x86_64",
"product": {
"name": "ovn22.12-host-0:22.12.1-94.el9fdp.x86_64",
"product_id": "ovn22.12-host-0:22.12.1-94.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host@22.12.1-94.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.x86_64",
"product": {
"name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.x86_64",
"product_id": "ovn22.12-vtep-0:22.12.1-94.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep@22.12.1-94.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.x86_64",
"product": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.x86_64",
"product_id": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debugsource@22.12.1-94.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"product": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"product_id": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central-debuginfo@22.12.1-94.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"product": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"product_id": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debuginfo@22.12.1-94.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"product": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"product_id": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host-debuginfo@22.12.1-94.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"product": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"product_id": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep-debuginfo@22.12.1-94.el9fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.12-0:22.12.1-94.el9fdp.ppc64le",
"product": {
"name": "ovn22.12-0:22.12.1-94.el9fdp.ppc64le",
"product_id": "ovn22.12-0:22.12.1-94.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-0:22.12.1-94.el9fdp.ppc64le",
"product": {
"name": "ovn22.12-central-0:22.12.1-94.el9fdp.ppc64le",
"product_id": "ovn22.12-central-0:22.12.1-94.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central@22.12.1-94.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-0:22.12.1-94.el9fdp.ppc64le",
"product": {
"name": "ovn22.12-host-0:22.12.1-94.el9fdp.ppc64le",
"product_id": "ovn22.12-host-0:22.12.1-94.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host@22.12.1-94.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.ppc64le",
"product": {
"name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.ppc64le",
"product_id": "ovn22.12-vtep-0:22.12.1-94.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep@22.12.1-94.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.ppc64le",
"product": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.ppc64le",
"product_id": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debugsource@22.12.1-94.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"product": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"product_id": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central-debuginfo@22.12.1-94.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"product": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"product_id": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debuginfo@22.12.1-94.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"product": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"product_id": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host-debuginfo@22.12.1-94.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"product": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"product_id": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep-debuginfo@22.12.1-94.el9fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.12-0:22.12.1-94.el9fdp.aarch64",
"product": {
"name": "ovn22.12-0:22.12.1-94.el9fdp.aarch64",
"product_id": "ovn22.12-0:22.12.1-94.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-0:22.12.1-94.el9fdp.aarch64",
"product": {
"name": "ovn22.12-central-0:22.12.1-94.el9fdp.aarch64",
"product_id": "ovn22.12-central-0:22.12.1-94.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central@22.12.1-94.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-0:22.12.1-94.el9fdp.aarch64",
"product": {
"name": "ovn22.12-host-0:22.12.1-94.el9fdp.aarch64",
"product_id": "ovn22.12-host-0:22.12.1-94.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host@22.12.1-94.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.aarch64",
"product": {
"name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.aarch64",
"product_id": "ovn22.12-vtep-0:22.12.1-94.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep@22.12.1-94.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.aarch64",
"product": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.aarch64",
"product_id": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debugsource@22.12.1-94.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"product": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"product_id": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central-debuginfo@22.12.1-94.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"product": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"product_id": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debuginfo@22.12.1-94.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"product": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"product_id": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host-debuginfo@22.12.1-94.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"product": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"product_id": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep-debuginfo@22.12.1-94.el9fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.12-0:22.12.1-94.el9fdp.s390x",
"product": {
"name": "ovn22.12-0:22.12.1-94.el9fdp.s390x",
"product_id": "ovn22.12-0:22.12.1-94.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-0:22.12.1-94.el9fdp.s390x",
"product": {
"name": "ovn22.12-central-0:22.12.1-94.el9fdp.s390x",
"product_id": "ovn22.12-central-0:22.12.1-94.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central@22.12.1-94.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-0:22.12.1-94.el9fdp.s390x",
"product": {
"name": "ovn22.12-host-0:22.12.1-94.el9fdp.s390x",
"product_id": "ovn22.12-host-0:22.12.1-94.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host@22.12.1-94.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.s390x",
"product": {
"name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.s390x",
"product_id": "ovn22.12-vtep-0:22.12.1-94.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep@22.12.1-94.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.s390x",
"product": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.s390x",
"product_id": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debugsource@22.12.1-94.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.s390x",
"product": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.s390x",
"product_id": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central-debuginfo@22.12.1-94.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.s390x",
"product": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.s390x",
"product_id": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debuginfo@22.12.1-94.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.s390x",
"product": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.s390x",
"product_id": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host-debuginfo@22.12.1-94.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.s390x",
"product": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.s390x",
"product_id": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep-debuginfo@22.12.1-94.el9fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-0:22.12.1-94.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.aarch64"
},
"product_reference": "ovn22.12-0:22.12.1-94.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-0:22.12.1-94.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.ppc64le"
},
"product_reference": "ovn22.12-0:22.12.1-94.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-0:22.12.1-94.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.s390x"
},
"product_reference": "ovn22.12-0:22.12.1-94.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-0:22.12.1-94.el9fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.src"
},
"product_reference": "ovn22.12-0:22.12.1-94.el9fdp.src",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-0:22.12.1-94.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.x86_64"
},
"product_reference": "ovn22.12-0:22.12.1-94.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-0:22.12.1-94.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.aarch64"
},
"product_reference": "ovn22.12-central-0:22.12.1-94.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-0:22.12.1-94.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.ppc64le"
},
"product_reference": "ovn22.12-central-0:22.12.1-94.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-0:22.12.1-94.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.s390x"
},
"product_reference": "ovn22.12-central-0:22.12.1-94.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-0:22.12.1-94.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.x86_64"
},
"product_reference": "ovn22.12-central-0:22.12.1-94.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.aarch64"
},
"product_reference": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.ppc64le"
},
"product_reference": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.s390x"
},
"product_reference": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.x86_64"
},
"product_reference": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.aarch64"
},
"product_reference": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.ppc64le"
},
"product_reference": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.s390x"
},
"product_reference": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.x86_64"
},
"product_reference": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.aarch64"
},
"product_reference": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.ppc64le"
},
"product_reference": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.s390x"
},
"product_reference": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.x86_64"
},
"product_reference": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-0:22.12.1-94.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.aarch64"
},
"product_reference": "ovn22.12-host-0:22.12.1-94.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-0:22.12.1-94.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.ppc64le"
},
"product_reference": "ovn22.12-host-0:22.12.1-94.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-0:22.12.1-94.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.s390x"
},
"product_reference": "ovn22.12-host-0:22.12.1-94.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-0:22.12.1-94.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.x86_64"
},
"product_reference": "ovn22.12-host-0:22.12.1-94.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.aarch64"
},
"product_reference": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.ppc64le"
},
"product_reference": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.s390x"
},
"product_reference": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.x86_64"
},
"product_reference": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.aarch64"
},
"product_reference": "ovn22.12-vtep-0:22.12.1-94.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.ppc64le"
},
"product_reference": "ovn22.12-vtep-0:22.12.1-94.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.s390x"
},
"product_reference": "ovn22.12-vtep-0:22.12.1-94.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.x86_64"
},
"product_reference": "ovn22.12-vtep-0:22.12.1-94.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.aarch64"
},
"product_reference": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.ppc64le"
},
"product_reference": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.s390x"
},
"product_reference": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.x86_64"
},
"product_reference": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Frode Nordahl"
],
"organization": "Canonical"
}
],
"cve": "CVE-2024-2182",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2024-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: insufficient validation of BFD packets may lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.src",
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"category": "external",
"summary": "RHBZ#2267840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2182"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182"
},
{
"category": "external",
"summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html",
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5",
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
}
],
"release_date": "2024-03-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:46:20+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.src",
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1392"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.src",
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ovn: insufficient validation of BFD packets may lead to denial of service"
}
]
}
RHSA-2024_1388
Vulnerability from csaf_redhat - Published: 2024-03-19 15:42 - Updated: 2024-11-15 16:11Summary
Red Hat Security Advisory: ovn23.03 security update
Notes
Topic
An update for ovn23.03 is now available in Fast Datapath for Red Hat
Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn23.03: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ovn23.03 is now available in Fast Datapath for Red Hat\nEnterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn23.03: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1388",
"url": "https://access.redhat.com/errata/RHSA-2024:1388"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1388.json"
}
],
"title": "Red Hat Security Advisory: ovn23.03 security update",
"tracking": {
"current_release_date": "2024-11-15T16:11:43+00:00",
"generator": {
"date": "2024-11-15T16:11:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:1388",
"initial_release_date": "2024-03-19T15:42:17+00:00",
"revision_history": [
{
"date": "2024-03-19T15:42:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-03-19T15:42:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T16:11:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fast Datapath for Red Hat Enterprise Linux 8",
"product": {
"name": "Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::fastdatapath"
}
}
}
],
"category": "product_family",
"name": "Fast Datapath"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.03-0:23.03.1-100.el8fdp.src",
"product": {
"name": "ovn23.03-0:23.03.1-100.el8fdp.src",
"product_id": "ovn23.03-0:23.03.1-100.el8fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el8fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.03-0:23.03.1-100.el8fdp.x86_64",
"product": {
"name": "ovn23.03-0:23.03.1-100.el8fdp.x86_64",
"product_id": "ovn23.03-0:23.03.1-100.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-0:23.03.1-100.el8fdp.x86_64",
"product": {
"name": "ovn23.03-central-0:23.03.1-100.el8fdp.x86_64",
"product_id": "ovn23.03-central-0:23.03.1-100.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central@23.03.1-100.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-0:23.03.1-100.el8fdp.x86_64",
"product": {
"name": "ovn23.03-host-0:23.03.1-100.el8fdp.x86_64",
"product_id": "ovn23.03-host-0:23.03.1-100.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host@23.03.1-100.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.x86_64",
"product": {
"name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.x86_64",
"product_id": "ovn23.03-vtep-0:23.03.1-100.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep@23.03.1-100.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.x86_64",
"product": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.x86_64",
"product_id": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debugsource@23.03.1-100.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"product": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"product_id": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central-debuginfo@23.03.1-100.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"product": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"product_id": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debuginfo@23.03.1-100.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"product": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"product_id": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host-debuginfo@23.03.1-100.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"product": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"product_id": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep-debuginfo@23.03.1-100.el8fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.03-0:23.03.1-100.el8fdp.ppc64le",
"product": {
"name": "ovn23.03-0:23.03.1-100.el8fdp.ppc64le",
"product_id": "ovn23.03-0:23.03.1-100.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-0:23.03.1-100.el8fdp.ppc64le",
"product": {
"name": "ovn23.03-central-0:23.03.1-100.el8fdp.ppc64le",
"product_id": "ovn23.03-central-0:23.03.1-100.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central@23.03.1-100.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-0:23.03.1-100.el8fdp.ppc64le",
"product": {
"name": "ovn23.03-host-0:23.03.1-100.el8fdp.ppc64le",
"product_id": "ovn23.03-host-0:23.03.1-100.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host@23.03.1-100.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.ppc64le",
"product": {
"name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.ppc64le",
"product_id": "ovn23.03-vtep-0:23.03.1-100.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep@23.03.1-100.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.ppc64le",
"product": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.ppc64le",
"product_id": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debugsource@23.03.1-100.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"product": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"product_id": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central-debuginfo@23.03.1-100.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"product": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"product_id": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debuginfo@23.03.1-100.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"product": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"product_id": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host-debuginfo@23.03.1-100.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"product": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"product_id": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep-debuginfo@23.03.1-100.el8fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.03-0:23.03.1-100.el8fdp.aarch64",
"product": {
"name": "ovn23.03-0:23.03.1-100.el8fdp.aarch64",
"product_id": "ovn23.03-0:23.03.1-100.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-0:23.03.1-100.el8fdp.aarch64",
"product": {
"name": "ovn23.03-central-0:23.03.1-100.el8fdp.aarch64",
"product_id": "ovn23.03-central-0:23.03.1-100.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central@23.03.1-100.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-0:23.03.1-100.el8fdp.aarch64",
"product": {
"name": "ovn23.03-host-0:23.03.1-100.el8fdp.aarch64",
"product_id": "ovn23.03-host-0:23.03.1-100.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host@23.03.1-100.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.aarch64",
"product": {
"name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.aarch64",
"product_id": "ovn23.03-vtep-0:23.03.1-100.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep@23.03.1-100.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.aarch64",
"product": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.aarch64",
"product_id": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debugsource@23.03.1-100.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"product": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"product_id": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central-debuginfo@23.03.1-100.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"product": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"product_id": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debuginfo@23.03.1-100.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"product": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"product_id": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host-debuginfo@23.03.1-100.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"product": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"product_id": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep-debuginfo@23.03.1-100.el8fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.03-0:23.03.1-100.el8fdp.s390x",
"product": {
"name": "ovn23.03-0:23.03.1-100.el8fdp.s390x",
"product_id": "ovn23.03-0:23.03.1-100.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-0:23.03.1-100.el8fdp.s390x",
"product": {
"name": "ovn23.03-central-0:23.03.1-100.el8fdp.s390x",
"product_id": "ovn23.03-central-0:23.03.1-100.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central@23.03.1-100.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-0:23.03.1-100.el8fdp.s390x",
"product": {
"name": "ovn23.03-host-0:23.03.1-100.el8fdp.s390x",
"product_id": "ovn23.03-host-0:23.03.1-100.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host@23.03.1-100.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.s390x",
"product": {
"name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.s390x",
"product_id": "ovn23.03-vtep-0:23.03.1-100.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep@23.03.1-100.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.s390x",
"product": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.s390x",
"product_id": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debugsource@23.03.1-100.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.s390x",
"product": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.s390x",
"product_id": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central-debuginfo@23.03.1-100.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.s390x",
"product": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.s390x",
"product_id": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debuginfo@23.03.1-100.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.s390x",
"product": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.s390x",
"product_id": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host-debuginfo@23.03.1-100.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.s390x",
"product": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.s390x",
"product_id": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep-debuginfo@23.03.1-100.el8fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-0:23.03.1-100.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.aarch64"
},
"product_reference": "ovn23.03-0:23.03.1-100.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-0:23.03.1-100.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.ppc64le"
},
"product_reference": "ovn23.03-0:23.03.1-100.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-0:23.03.1-100.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.s390x"
},
"product_reference": "ovn23.03-0:23.03.1-100.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-0:23.03.1-100.el8fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.src"
},
"product_reference": "ovn23.03-0:23.03.1-100.el8fdp.src",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-0:23.03.1-100.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.x86_64"
},
"product_reference": "ovn23.03-0:23.03.1-100.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-0:23.03.1-100.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.aarch64"
},
"product_reference": "ovn23.03-central-0:23.03.1-100.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-0:23.03.1-100.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.ppc64le"
},
"product_reference": "ovn23.03-central-0:23.03.1-100.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-0:23.03.1-100.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.s390x"
},
"product_reference": "ovn23.03-central-0:23.03.1-100.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-0:23.03.1-100.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.x86_64"
},
"product_reference": "ovn23.03-central-0:23.03.1-100.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.aarch64"
},
"product_reference": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.ppc64le"
},
"product_reference": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.s390x"
},
"product_reference": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.x86_64"
},
"product_reference": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.aarch64"
},
"product_reference": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.ppc64le"
},
"product_reference": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.s390x"
},
"product_reference": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.x86_64"
},
"product_reference": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.aarch64"
},
"product_reference": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.ppc64le"
},
"product_reference": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.s390x"
},
"product_reference": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.x86_64"
},
"product_reference": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-0:23.03.1-100.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.aarch64"
},
"product_reference": "ovn23.03-host-0:23.03.1-100.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-0:23.03.1-100.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.ppc64le"
},
"product_reference": "ovn23.03-host-0:23.03.1-100.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-0:23.03.1-100.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.s390x"
},
"product_reference": "ovn23.03-host-0:23.03.1-100.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-0:23.03.1-100.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.x86_64"
},
"product_reference": "ovn23.03-host-0:23.03.1-100.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.aarch64"
},
"product_reference": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.ppc64le"
},
"product_reference": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.s390x"
},
"product_reference": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.x86_64"
},
"product_reference": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.aarch64"
},
"product_reference": "ovn23.03-vtep-0:23.03.1-100.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.ppc64le"
},
"product_reference": "ovn23.03-vtep-0:23.03.1-100.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.s390x"
},
"product_reference": "ovn23.03-vtep-0:23.03.1-100.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.x86_64"
},
"product_reference": "ovn23.03-vtep-0:23.03.1-100.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.aarch64"
},
"product_reference": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.ppc64le"
},
"product_reference": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.s390x"
},
"product_reference": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.x86_64"
},
"product_reference": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Frode Nordahl"
],
"organization": "Canonical"
}
],
"cve": "CVE-2024-2182",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2024-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: insufficient validation of BFD packets may lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.src",
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"category": "external",
"summary": "RHBZ#2267840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2182"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182"
},
{
"category": "external",
"summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html",
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5",
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
}
],
"release_date": "2024-03-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:42:17+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.src",
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1388"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.src",
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ovn: insufficient validation of BFD packets may lead to denial of service"
}
]
}
RHSA-2024_4035
Vulnerability from csaf_redhat - Published: 2024-06-20 16:25 - Updated: 2024-11-15 16:17Summary
Red Hat Security Advisory: ovn-2021 security update
Notes
Topic
An update for ovn-2021 is now available in Fast Datapath for Red Hat
Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn-2021: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ovn-2021 is now available in Fast Datapath for Red Hat\nEnterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn-2021: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4035",
"url": "https://access.redhat.com/errata/RHSA-2024:4035"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2267840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4035.json"
}
],
"title": "Red Hat Security Advisory: ovn-2021 security update",
"tracking": {
"current_release_date": "2024-11-15T16:17:06+00:00",
"generator": {
"date": "2024-11-15T16:17:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:4035",
"initial_release_date": "2024-06-20T16:25:16+00:00",
"revision_history": [
{
"date": "2024-06-20T16:25:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-06-20T16:25:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T16:17:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fast Datapath for Red Hat Enterprise Linux 8",
"product": {
"name": "Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::fastdatapath"
}
}
}
],
"category": "product_family",
"name": "Fast Datapath"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn-2021-0:21.12.0-142.el8fdp.src",
"product": {
"name": "ovn-2021-0:21.12.0-142.el8fdp.src",
"product_id": "ovn-2021-0:21.12.0-142.el8fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021@21.12.0-142.el8fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn-2021-0:21.12.0-142.el8fdp.x86_64",
"product": {
"name": "ovn-2021-0:21.12.0-142.el8fdp.x86_64",
"product_id": "ovn-2021-0:21.12.0-142.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021@21.12.0-142.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-central-0:21.12.0-142.el8fdp.x86_64",
"product": {
"name": "ovn-2021-central-0:21.12.0-142.el8fdp.x86_64",
"product_id": "ovn-2021-central-0:21.12.0-142.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-central@21.12.0-142.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-host-0:21.12.0-142.el8fdp.x86_64",
"product": {
"name": "ovn-2021-host-0:21.12.0-142.el8fdp.x86_64",
"product_id": "ovn-2021-host-0:21.12.0-142.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-host@21.12.0-142.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.x86_64",
"product": {
"name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.x86_64",
"product_id": "ovn-2021-vtep-0:21.12.0-142.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-vtep@21.12.0-142.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.x86_64",
"product": {
"name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.x86_64",
"product_id": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-debugsource@21.12.0-142.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"product": {
"name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"product_id": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-central-debuginfo@21.12.0-142.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"product": {
"name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"product_id": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-debuginfo@21.12.0-142.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"product": {
"name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"product_id": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-host-debuginfo@21.12.0-142.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"product": {
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"product_id": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-vtep-debuginfo@21.12.0-142.el8fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn-2021-0:21.12.0-142.el8fdp.ppc64le",
"product": {
"name": "ovn-2021-0:21.12.0-142.el8fdp.ppc64le",
"product_id": "ovn-2021-0:21.12.0-142.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021@21.12.0-142.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-central-0:21.12.0-142.el8fdp.ppc64le",
"product": {
"name": "ovn-2021-central-0:21.12.0-142.el8fdp.ppc64le",
"product_id": "ovn-2021-central-0:21.12.0-142.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-central@21.12.0-142.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-host-0:21.12.0-142.el8fdp.ppc64le",
"product": {
"name": "ovn-2021-host-0:21.12.0-142.el8fdp.ppc64le",
"product_id": "ovn-2021-host-0:21.12.0-142.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-host@21.12.0-142.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.ppc64le",
"product": {
"name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.ppc64le",
"product_id": "ovn-2021-vtep-0:21.12.0-142.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-vtep@21.12.0-142.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.ppc64le",
"product": {
"name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.ppc64le",
"product_id": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-debugsource@21.12.0-142.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"product": {
"name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"product_id": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-central-debuginfo@21.12.0-142.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"product": {
"name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"product_id": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-debuginfo@21.12.0-142.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"product": {
"name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"product_id": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-host-debuginfo@21.12.0-142.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"product": {
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"product_id": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-vtep-debuginfo@21.12.0-142.el8fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn-2021-0:21.12.0-142.el8fdp.aarch64",
"product": {
"name": "ovn-2021-0:21.12.0-142.el8fdp.aarch64",
"product_id": "ovn-2021-0:21.12.0-142.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021@21.12.0-142.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-central-0:21.12.0-142.el8fdp.aarch64",
"product": {
"name": "ovn-2021-central-0:21.12.0-142.el8fdp.aarch64",
"product_id": "ovn-2021-central-0:21.12.0-142.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-central@21.12.0-142.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-host-0:21.12.0-142.el8fdp.aarch64",
"product": {
"name": "ovn-2021-host-0:21.12.0-142.el8fdp.aarch64",
"product_id": "ovn-2021-host-0:21.12.0-142.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-host@21.12.0-142.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.aarch64",
"product": {
"name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.aarch64",
"product_id": "ovn-2021-vtep-0:21.12.0-142.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-vtep@21.12.0-142.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.aarch64",
"product": {
"name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.aarch64",
"product_id": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-debugsource@21.12.0-142.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"product": {
"name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"product_id": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-central-debuginfo@21.12.0-142.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"product": {
"name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"product_id": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-debuginfo@21.12.0-142.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"product": {
"name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"product_id": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-host-debuginfo@21.12.0-142.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"product": {
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"product_id": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-vtep-debuginfo@21.12.0-142.el8fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn-2021-0:21.12.0-142.el8fdp.s390x",
"product": {
"name": "ovn-2021-0:21.12.0-142.el8fdp.s390x",
"product_id": "ovn-2021-0:21.12.0-142.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021@21.12.0-142.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-central-0:21.12.0-142.el8fdp.s390x",
"product": {
"name": "ovn-2021-central-0:21.12.0-142.el8fdp.s390x",
"product_id": "ovn-2021-central-0:21.12.0-142.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-central@21.12.0-142.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-host-0:21.12.0-142.el8fdp.s390x",
"product": {
"name": "ovn-2021-host-0:21.12.0-142.el8fdp.s390x",
"product_id": "ovn-2021-host-0:21.12.0-142.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-host@21.12.0-142.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.s390x",
"product": {
"name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.s390x",
"product_id": "ovn-2021-vtep-0:21.12.0-142.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-vtep@21.12.0-142.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.s390x",
"product": {
"name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.s390x",
"product_id": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-debugsource@21.12.0-142.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.s390x",
"product": {
"name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.s390x",
"product_id": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-central-debuginfo@21.12.0-142.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.s390x",
"product": {
"name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.s390x",
"product_id": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-debuginfo@21.12.0-142.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.s390x",
"product": {
"name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.s390x",
"product_id": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-host-debuginfo@21.12.0-142.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.s390x",
"product": {
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.s390x",
"product_id": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-vtep-debuginfo@21.12.0-142.el8fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-0:21.12.0-142.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.aarch64"
},
"product_reference": "ovn-2021-0:21.12.0-142.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-0:21.12.0-142.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.ppc64le"
},
"product_reference": "ovn-2021-0:21.12.0-142.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-0:21.12.0-142.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.s390x"
},
"product_reference": "ovn-2021-0:21.12.0-142.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-0:21.12.0-142.el8fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.src"
},
"product_reference": "ovn-2021-0:21.12.0-142.el8fdp.src",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-0:21.12.0-142.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.x86_64"
},
"product_reference": "ovn-2021-0:21.12.0-142.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-central-0:21.12.0-142.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.aarch64"
},
"product_reference": "ovn-2021-central-0:21.12.0-142.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-central-0:21.12.0-142.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.ppc64le"
},
"product_reference": "ovn-2021-central-0:21.12.0-142.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-central-0:21.12.0-142.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.s390x"
},
"product_reference": "ovn-2021-central-0:21.12.0-142.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-central-0:21.12.0-142.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.x86_64"
},
"product_reference": "ovn-2021-central-0:21.12.0-142.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.aarch64"
},
"product_reference": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.ppc64le"
},
"product_reference": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.s390x"
},
"product_reference": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.x86_64"
},
"product_reference": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.aarch64"
},
"product_reference": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.ppc64le"
},
"product_reference": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.s390x"
},
"product_reference": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.x86_64"
},
"product_reference": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.aarch64"
},
"product_reference": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.ppc64le"
},
"product_reference": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.s390x"
},
"product_reference": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.x86_64"
},
"product_reference": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-host-0:21.12.0-142.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.aarch64"
},
"product_reference": "ovn-2021-host-0:21.12.0-142.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-host-0:21.12.0-142.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.ppc64le"
},
"product_reference": "ovn-2021-host-0:21.12.0-142.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-host-0:21.12.0-142.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.s390x"
},
"product_reference": "ovn-2021-host-0:21.12.0-142.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-host-0:21.12.0-142.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.x86_64"
},
"product_reference": "ovn-2021-host-0:21.12.0-142.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.aarch64"
},
"product_reference": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.ppc64le"
},
"product_reference": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.s390x"
},
"product_reference": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.x86_64"
},
"product_reference": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.aarch64"
},
"product_reference": "ovn-2021-vtep-0:21.12.0-142.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.ppc64le"
},
"product_reference": "ovn-2021-vtep-0:21.12.0-142.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.s390x"
},
"product_reference": "ovn-2021-vtep-0:21.12.0-142.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.x86_64"
},
"product_reference": "ovn-2021-vtep-0:21.12.0-142.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.aarch64"
},
"product_reference": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.ppc64le"
},
"product_reference": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.s390x"
},
"product_reference": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.x86_64"
},
"product_reference": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Frode Nordahl"
],
"organization": "Canonical"
}
],
"cve": "CVE-2024-2182",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2024-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: insufficient validation of BFD packets may lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.src",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"category": "external",
"summary": "RHBZ#2267840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2182"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182"
},
{
"category": "external",
"summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html",
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5",
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
}
],
"release_date": "2024-03-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-20T16:25:16+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.src",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4035"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.src",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ovn: insufficient validation of BFD packets may lead to denial of service"
}
]
}
RHSA-2024:1391
Vulnerability from csaf_redhat - Published: 2024-03-19 15:46 - Updated: 2025-11-21 18:57Summary
Red Hat Security Advisory: ovn23.06 security update
Notes
Topic
An update for ovn23.06 is now available in Fast Datapath for Red Hat
Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn23.06: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ovn23.06 is now available in Fast Datapath for Red Hat\nEnterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn23.06: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1391",
"url": "https://access.redhat.com/errata/RHSA-2024:1391"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1391.json"
}
],
"title": "Red Hat Security Advisory: ovn23.06 security update",
"tracking": {
"current_release_date": "2025-11-21T18:57:28+00:00",
"generator": {
"date": "2025-11-21T18:57:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:1391",
"initial_release_date": "2024-03-19T15:46:15+00:00",
"revision_history": [
{
"date": "2024-03-19T15:46:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-03-19T15:46:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:57:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product": {
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::fastdatapath"
}
}
}
],
"category": "product_family",
"name": "Fast Datapath"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.1-112.el9fdp.src",
"product": {
"name": "ovn23.06-0:23.06.1-112.el9fdp.src",
"product_id": "ovn23.06-0:23.06.1-112.el9fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el9fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.1-112.el9fdp.x86_64",
"product": {
"name": "ovn23.06-0:23.06.1-112.el9fdp.x86_64",
"product_id": "ovn23.06-0:23.06.1-112.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-0:23.06.1-112.el9fdp.x86_64",
"product": {
"name": "ovn23.06-central-0:23.06.1-112.el9fdp.x86_64",
"product_id": "ovn23.06-central-0:23.06.1-112.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central@23.06.1-112.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-0:23.06.1-112.el9fdp.x86_64",
"product": {
"name": "ovn23.06-host-0:23.06.1-112.el9fdp.x86_64",
"product_id": "ovn23.06-host-0:23.06.1-112.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host@23.06.1-112.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.x86_64",
"product": {
"name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.x86_64",
"product_id": "ovn23.06-vtep-0:23.06.1-112.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.1-112.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.x86_64",
"product": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.x86_64",
"product_id": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.1-112.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"product": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"product_id": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.1-112.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"product": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"product_id": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.1-112.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"product": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"product_id": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.1-112.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"product": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"product_id": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.1-112.el9fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.1-112.el9fdp.ppc64le",
"product": {
"name": "ovn23.06-0:23.06.1-112.el9fdp.ppc64le",
"product_id": "ovn23.06-0:23.06.1-112.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-0:23.06.1-112.el9fdp.ppc64le",
"product": {
"name": "ovn23.06-central-0:23.06.1-112.el9fdp.ppc64le",
"product_id": "ovn23.06-central-0:23.06.1-112.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central@23.06.1-112.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-0:23.06.1-112.el9fdp.ppc64le",
"product": {
"name": "ovn23.06-host-0:23.06.1-112.el9fdp.ppc64le",
"product_id": "ovn23.06-host-0:23.06.1-112.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host@23.06.1-112.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.ppc64le",
"product": {
"name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.ppc64le",
"product_id": "ovn23.06-vtep-0:23.06.1-112.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.1-112.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.ppc64le",
"product": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.ppc64le",
"product_id": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.1-112.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"product": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"product_id": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.1-112.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"product": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"product_id": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.1-112.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"product": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"product_id": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.1-112.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"product": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"product_id": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.1-112.el9fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.1-112.el9fdp.aarch64",
"product": {
"name": "ovn23.06-0:23.06.1-112.el9fdp.aarch64",
"product_id": "ovn23.06-0:23.06.1-112.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-0:23.06.1-112.el9fdp.aarch64",
"product": {
"name": "ovn23.06-central-0:23.06.1-112.el9fdp.aarch64",
"product_id": "ovn23.06-central-0:23.06.1-112.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central@23.06.1-112.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-0:23.06.1-112.el9fdp.aarch64",
"product": {
"name": "ovn23.06-host-0:23.06.1-112.el9fdp.aarch64",
"product_id": "ovn23.06-host-0:23.06.1-112.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host@23.06.1-112.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.aarch64",
"product": {
"name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.aarch64",
"product_id": "ovn23.06-vtep-0:23.06.1-112.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.1-112.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.aarch64",
"product": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.aarch64",
"product_id": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.1-112.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"product": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"product_id": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.1-112.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"product": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"product_id": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.1-112.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"product": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"product_id": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.1-112.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"product": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"product_id": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.1-112.el9fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.1-112.el9fdp.s390x",
"product": {
"name": "ovn23.06-0:23.06.1-112.el9fdp.s390x",
"product_id": "ovn23.06-0:23.06.1-112.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-0:23.06.1-112.el9fdp.s390x",
"product": {
"name": "ovn23.06-central-0:23.06.1-112.el9fdp.s390x",
"product_id": "ovn23.06-central-0:23.06.1-112.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central@23.06.1-112.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-0:23.06.1-112.el9fdp.s390x",
"product": {
"name": "ovn23.06-host-0:23.06.1-112.el9fdp.s390x",
"product_id": "ovn23.06-host-0:23.06.1-112.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host@23.06.1-112.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.s390x",
"product": {
"name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.s390x",
"product_id": "ovn23.06-vtep-0:23.06.1-112.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.1-112.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.s390x",
"product": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.s390x",
"product_id": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.1-112.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.s390x",
"product": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.s390x",
"product_id": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.1-112.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.s390x",
"product": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.s390x",
"product_id": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.1-112.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.s390x",
"product": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.s390x",
"product_id": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.1-112.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.s390x",
"product": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.s390x",
"product_id": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.1-112.el9fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.1-112.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.aarch64"
},
"product_reference": "ovn23.06-0:23.06.1-112.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.1-112.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.ppc64le"
},
"product_reference": "ovn23.06-0:23.06.1-112.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.1-112.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.s390x"
},
"product_reference": "ovn23.06-0:23.06.1-112.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.1-112.el9fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.src"
},
"product_reference": "ovn23.06-0:23.06.1-112.el9fdp.src",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.1-112.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.x86_64"
},
"product_reference": "ovn23.06-0:23.06.1-112.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-0:23.06.1-112.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.aarch64"
},
"product_reference": "ovn23.06-central-0:23.06.1-112.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-0:23.06.1-112.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.ppc64le"
},
"product_reference": "ovn23.06-central-0:23.06.1-112.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-0:23.06.1-112.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.s390x"
},
"product_reference": "ovn23.06-central-0:23.06.1-112.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-0:23.06.1-112.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.x86_64"
},
"product_reference": "ovn23.06-central-0:23.06.1-112.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.aarch64"
},
"product_reference": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.ppc64le"
},
"product_reference": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.s390x"
},
"product_reference": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.x86_64"
},
"product_reference": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.aarch64"
},
"product_reference": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.ppc64le"
},
"product_reference": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.s390x"
},
"product_reference": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.x86_64"
},
"product_reference": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.aarch64"
},
"product_reference": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.ppc64le"
},
"product_reference": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.s390x"
},
"product_reference": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.x86_64"
},
"product_reference": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-0:23.06.1-112.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.aarch64"
},
"product_reference": "ovn23.06-host-0:23.06.1-112.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-0:23.06.1-112.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.ppc64le"
},
"product_reference": "ovn23.06-host-0:23.06.1-112.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-0:23.06.1-112.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.s390x"
},
"product_reference": "ovn23.06-host-0:23.06.1-112.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-0:23.06.1-112.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.x86_64"
},
"product_reference": "ovn23.06-host-0:23.06.1-112.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.aarch64"
},
"product_reference": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.ppc64le"
},
"product_reference": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.s390x"
},
"product_reference": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.x86_64"
},
"product_reference": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.aarch64"
},
"product_reference": "ovn23.06-vtep-0:23.06.1-112.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.ppc64le"
},
"product_reference": "ovn23.06-vtep-0:23.06.1-112.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.s390x"
},
"product_reference": "ovn23.06-vtep-0:23.06.1-112.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.x86_64"
},
"product_reference": "ovn23.06-vtep-0:23.06.1-112.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.aarch64"
},
"product_reference": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.ppc64le"
},
"product_reference": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.s390x"
},
"product_reference": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.x86_64"
},
"product_reference": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Frode Nordahl"
],
"organization": "Canonical"
}
],
"cve": "CVE-2024-2182",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2024-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: insufficient validation of BFD packets may lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.src",
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"category": "external",
"summary": "RHBZ#2267840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2182"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182"
},
{
"category": "external",
"summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html",
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5",
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
}
],
"release_date": "2024-03-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:46:15+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.src",
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1391"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.src",
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ovn: insufficient validation of BFD packets may lead to denial of service"
}
]
}
RHSA-2024_1391
Vulnerability from csaf_redhat - Published: 2024-03-19 15:46 - Updated: 2024-11-15 16:11Summary
Red Hat Security Advisory: ovn23.06 security update
Notes
Topic
An update for ovn23.06 is now available in Fast Datapath for Red Hat
Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn23.06: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ovn23.06 is now available in Fast Datapath for Red Hat\nEnterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn23.06: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1391",
"url": "https://access.redhat.com/errata/RHSA-2024:1391"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1391.json"
}
],
"title": "Red Hat Security Advisory: ovn23.06 security update",
"tracking": {
"current_release_date": "2024-11-15T16:11:12+00:00",
"generator": {
"date": "2024-11-15T16:11:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:1391",
"initial_release_date": "2024-03-19T15:46:15+00:00",
"revision_history": [
{
"date": "2024-03-19T15:46:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-03-19T15:46:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T16:11:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product": {
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::fastdatapath"
}
}
}
],
"category": "product_family",
"name": "Fast Datapath"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.1-112.el9fdp.src",
"product": {
"name": "ovn23.06-0:23.06.1-112.el9fdp.src",
"product_id": "ovn23.06-0:23.06.1-112.el9fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el9fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.1-112.el9fdp.x86_64",
"product": {
"name": "ovn23.06-0:23.06.1-112.el9fdp.x86_64",
"product_id": "ovn23.06-0:23.06.1-112.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-0:23.06.1-112.el9fdp.x86_64",
"product": {
"name": "ovn23.06-central-0:23.06.1-112.el9fdp.x86_64",
"product_id": "ovn23.06-central-0:23.06.1-112.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central@23.06.1-112.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-0:23.06.1-112.el9fdp.x86_64",
"product": {
"name": "ovn23.06-host-0:23.06.1-112.el9fdp.x86_64",
"product_id": "ovn23.06-host-0:23.06.1-112.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host@23.06.1-112.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.x86_64",
"product": {
"name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.x86_64",
"product_id": "ovn23.06-vtep-0:23.06.1-112.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.1-112.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.x86_64",
"product": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.x86_64",
"product_id": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.1-112.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"product": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"product_id": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.1-112.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"product": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"product_id": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.1-112.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"product": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"product_id": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.1-112.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"product": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"product_id": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.1-112.el9fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.1-112.el9fdp.ppc64le",
"product": {
"name": "ovn23.06-0:23.06.1-112.el9fdp.ppc64le",
"product_id": "ovn23.06-0:23.06.1-112.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-0:23.06.1-112.el9fdp.ppc64le",
"product": {
"name": "ovn23.06-central-0:23.06.1-112.el9fdp.ppc64le",
"product_id": "ovn23.06-central-0:23.06.1-112.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central@23.06.1-112.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-0:23.06.1-112.el9fdp.ppc64le",
"product": {
"name": "ovn23.06-host-0:23.06.1-112.el9fdp.ppc64le",
"product_id": "ovn23.06-host-0:23.06.1-112.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host@23.06.1-112.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.ppc64le",
"product": {
"name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.ppc64le",
"product_id": "ovn23.06-vtep-0:23.06.1-112.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.1-112.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.ppc64le",
"product": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.ppc64le",
"product_id": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.1-112.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"product": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"product_id": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.1-112.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"product": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"product_id": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.1-112.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"product": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"product_id": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.1-112.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"product": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"product_id": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.1-112.el9fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.1-112.el9fdp.aarch64",
"product": {
"name": "ovn23.06-0:23.06.1-112.el9fdp.aarch64",
"product_id": "ovn23.06-0:23.06.1-112.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-0:23.06.1-112.el9fdp.aarch64",
"product": {
"name": "ovn23.06-central-0:23.06.1-112.el9fdp.aarch64",
"product_id": "ovn23.06-central-0:23.06.1-112.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central@23.06.1-112.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-0:23.06.1-112.el9fdp.aarch64",
"product": {
"name": "ovn23.06-host-0:23.06.1-112.el9fdp.aarch64",
"product_id": "ovn23.06-host-0:23.06.1-112.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host@23.06.1-112.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.aarch64",
"product": {
"name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.aarch64",
"product_id": "ovn23.06-vtep-0:23.06.1-112.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.1-112.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.aarch64",
"product": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.aarch64",
"product_id": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.1-112.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"product": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"product_id": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.1-112.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"product": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"product_id": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.1-112.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"product": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"product_id": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.1-112.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"product": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"product_id": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.1-112.el9fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.1-112.el9fdp.s390x",
"product": {
"name": "ovn23.06-0:23.06.1-112.el9fdp.s390x",
"product_id": "ovn23.06-0:23.06.1-112.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-0:23.06.1-112.el9fdp.s390x",
"product": {
"name": "ovn23.06-central-0:23.06.1-112.el9fdp.s390x",
"product_id": "ovn23.06-central-0:23.06.1-112.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central@23.06.1-112.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-0:23.06.1-112.el9fdp.s390x",
"product": {
"name": "ovn23.06-host-0:23.06.1-112.el9fdp.s390x",
"product_id": "ovn23.06-host-0:23.06.1-112.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host@23.06.1-112.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.s390x",
"product": {
"name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.s390x",
"product_id": "ovn23.06-vtep-0:23.06.1-112.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.1-112.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.s390x",
"product": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.s390x",
"product_id": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.1-112.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.s390x",
"product": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.s390x",
"product_id": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.1-112.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.s390x",
"product": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.s390x",
"product_id": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.1-112.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.s390x",
"product": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.s390x",
"product_id": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.1-112.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.s390x",
"product": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.s390x",
"product_id": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.1-112.el9fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.1-112.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.aarch64"
},
"product_reference": "ovn23.06-0:23.06.1-112.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.1-112.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.ppc64le"
},
"product_reference": "ovn23.06-0:23.06.1-112.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.1-112.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.s390x"
},
"product_reference": "ovn23.06-0:23.06.1-112.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.1-112.el9fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.src"
},
"product_reference": "ovn23.06-0:23.06.1-112.el9fdp.src",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.1-112.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.x86_64"
},
"product_reference": "ovn23.06-0:23.06.1-112.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-0:23.06.1-112.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.aarch64"
},
"product_reference": "ovn23.06-central-0:23.06.1-112.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-0:23.06.1-112.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.ppc64le"
},
"product_reference": "ovn23.06-central-0:23.06.1-112.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-0:23.06.1-112.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.s390x"
},
"product_reference": "ovn23.06-central-0:23.06.1-112.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-0:23.06.1-112.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.x86_64"
},
"product_reference": "ovn23.06-central-0:23.06.1-112.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.aarch64"
},
"product_reference": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.ppc64le"
},
"product_reference": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.s390x"
},
"product_reference": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.x86_64"
},
"product_reference": "ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.aarch64"
},
"product_reference": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.ppc64le"
},
"product_reference": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.s390x"
},
"product_reference": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.x86_64"
},
"product_reference": "ovn23.06-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.aarch64"
},
"product_reference": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.ppc64le"
},
"product_reference": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.s390x"
},
"product_reference": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.x86_64"
},
"product_reference": "ovn23.06-debugsource-0:23.06.1-112.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-0:23.06.1-112.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.aarch64"
},
"product_reference": "ovn23.06-host-0:23.06.1-112.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-0:23.06.1-112.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.ppc64le"
},
"product_reference": "ovn23.06-host-0:23.06.1-112.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-0:23.06.1-112.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.s390x"
},
"product_reference": "ovn23.06-host-0:23.06.1-112.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-0:23.06.1-112.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.x86_64"
},
"product_reference": "ovn23.06-host-0:23.06.1-112.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.aarch64"
},
"product_reference": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.ppc64le"
},
"product_reference": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.s390x"
},
"product_reference": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.x86_64"
},
"product_reference": "ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.aarch64"
},
"product_reference": "ovn23.06-vtep-0:23.06.1-112.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.ppc64le"
},
"product_reference": "ovn23.06-vtep-0:23.06.1-112.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.s390x"
},
"product_reference": "ovn23.06-vtep-0:23.06.1-112.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-0:23.06.1-112.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.x86_64"
},
"product_reference": "ovn23.06-vtep-0:23.06.1-112.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.aarch64"
},
"product_reference": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.ppc64le"
},
"product_reference": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.s390x"
},
"product_reference": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.x86_64"
},
"product_reference": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Frode Nordahl"
],
"organization": "Canonical"
}
],
"cve": "CVE-2024-2182",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2024-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: insufficient validation of BFD packets may lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.src",
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"category": "external",
"summary": "RHBZ#2267840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2182"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182"
},
{
"category": "external",
"summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html",
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5",
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
}
],
"release_date": "2024-03-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:46:15+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.src",
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1391"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.src",
"9Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el9fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ovn: insufficient validation of BFD packets may lead to denial of service"
}
]
}
RHSA-2024:4035
Vulnerability from csaf_redhat - Published: 2024-06-20 16:25 - Updated: 2025-11-21 19:04Summary
Red Hat Security Advisory: ovn-2021 security update
Notes
Topic
An update for ovn-2021 is now available in Fast Datapath for Red Hat
Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn-2021: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ovn-2021 is now available in Fast Datapath for Red Hat\nEnterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn-2021: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4035",
"url": "https://access.redhat.com/errata/RHSA-2024:4035"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2267840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4035.json"
}
],
"title": "Red Hat Security Advisory: ovn-2021 security update",
"tracking": {
"current_release_date": "2025-11-21T19:04:22+00:00",
"generator": {
"date": "2025-11-21T19:04:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:4035",
"initial_release_date": "2024-06-20T16:25:16+00:00",
"revision_history": [
{
"date": "2024-06-20T16:25:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-06-20T16:25:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:04:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fast Datapath for Red Hat Enterprise Linux 8",
"product": {
"name": "Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::fastdatapath"
}
}
}
],
"category": "product_family",
"name": "Fast Datapath"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn-2021-0:21.12.0-142.el8fdp.src",
"product": {
"name": "ovn-2021-0:21.12.0-142.el8fdp.src",
"product_id": "ovn-2021-0:21.12.0-142.el8fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021@21.12.0-142.el8fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn-2021-0:21.12.0-142.el8fdp.x86_64",
"product": {
"name": "ovn-2021-0:21.12.0-142.el8fdp.x86_64",
"product_id": "ovn-2021-0:21.12.0-142.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021@21.12.0-142.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-central-0:21.12.0-142.el8fdp.x86_64",
"product": {
"name": "ovn-2021-central-0:21.12.0-142.el8fdp.x86_64",
"product_id": "ovn-2021-central-0:21.12.0-142.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-central@21.12.0-142.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-host-0:21.12.0-142.el8fdp.x86_64",
"product": {
"name": "ovn-2021-host-0:21.12.0-142.el8fdp.x86_64",
"product_id": "ovn-2021-host-0:21.12.0-142.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-host@21.12.0-142.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.x86_64",
"product": {
"name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.x86_64",
"product_id": "ovn-2021-vtep-0:21.12.0-142.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-vtep@21.12.0-142.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.x86_64",
"product": {
"name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.x86_64",
"product_id": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-debugsource@21.12.0-142.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"product": {
"name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"product_id": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-central-debuginfo@21.12.0-142.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"product": {
"name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"product_id": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-debuginfo@21.12.0-142.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"product": {
"name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"product_id": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-host-debuginfo@21.12.0-142.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"product": {
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"product_id": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-vtep-debuginfo@21.12.0-142.el8fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn-2021-0:21.12.0-142.el8fdp.ppc64le",
"product": {
"name": "ovn-2021-0:21.12.0-142.el8fdp.ppc64le",
"product_id": "ovn-2021-0:21.12.0-142.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021@21.12.0-142.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-central-0:21.12.0-142.el8fdp.ppc64le",
"product": {
"name": "ovn-2021-central-0:21.12.0-142.el8fdp.ppc64le",
"product_id": "ovn-2021-central-0:21.12.0-142.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-central@21.12.0-142.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-host-0:21.12.0-142.el8fdp.ppc64le",
"product": {
"name": "ovn-2021-host-0:21.12.0-142.el8fdp.ppc64le",
"product_id": "ovn-2021-host-0:21.12.0-142.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-host@21.12.0-142.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.ppc64le",
"product": {
"name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.ppc64le",
"product_id": "ovn-2021-vtep-0:21.12.0-142.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-vtep@21.12.0-142.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.ppc64le",
"product": {
"name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.ppc64le",
"product_id": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-debugsource@21.12.0-142.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"product": {
"name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"product_id": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-central-debuginfo@21.12.0-142.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"product": {
"name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"product_id": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-debuginfo@21.12.0-142.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"product": {
"name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"product_id": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-host-debuginfo@21.12.0-142.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"product": {
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"product_id": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-vtep-debuginfo@21.12.0-142.el8fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn-2021-0:21.12.0-142.el8fdp.aarch64",
"product": {
"name": "ovn-2021-0:21.12.0-142.el8fdp.aarch64",
"product_id": "ovn-2021-0:21.12.0-142.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021@21.12.0-142.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-central-0:21.12.0-142.el8fdp.aarch64",
"product": {
"name": "ovn-2021-central-0:21.12.0-142.el8fdp.aarch64",
"product_id": "ovn-2021-central-0:21.12.0-142.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-central@21.12.0-142.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-host-0:21.12.0-142.el8fdp.aarch64",
"product": {
"name": "ovn-2021-host-0:21.12.0-142.el8fdp.aarch64",
"product_id": "ovn-2021-host-0:21.12.0-142.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-host@21.12.0-142.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.aarch64",
"product": {
"name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.aarch64",
"product_id": "ovn-2021-vtep-0:21.12.0-142.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-vtep@21.12.0-142.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.aarch64",
"product": {
"name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.aarch64",
"product_id": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-debugsource@21.12.0-142.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"product": {
"name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"product_id": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-central-debuginfo@21.12.0-142.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"product": {
"name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"product_id": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-debuginfo@21.12.0-142.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"product": {
"name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"product_id": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-host-debuginfo@21.12.0-142.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"product": {
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"product_id": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-vtep-debuginfo@21.12.0-142.el8fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn-2021-0:21.12.0-142.el8fdp.s390x",
"product": {
"name": "ovn-2021-0:21.12.0-142.el8fdp.s390x",
"product_id": "ovn-2021-0:21.12.0-142.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021@21.12.0-142.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-central-0:21.12.0-142.el8fdp.s390x",
"product": {
"name": "ovn-2021-central-0:21.12.0-142.el8fdp.s390x",
"product_id": "ovn-2021-central-0:21.12.0-142.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-central@21.12.0-142.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-host-0:21.12.0-142.el8fdp.s390x",
"product": {
"name": "ovn-2021-host-0:21.12.0-142.el8fdp.s390x",
"product_id": "ovn-2021-host-0:21.12.0-142.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-host@21.12.0-142.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.s390x",
"product": {
"name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.s390x",
"product_id": "ovn-2021-vtep-0:21.12.0-142.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-vtep@21.12.0-142.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.s390x",
"product": {
"name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.s390x",
"product_id": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-debugsource@21.12.0-142.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.s390x",
"product": {
"name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.s390x",
"product_id": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-central-debuginfo@21.12.0-142.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.s390x",
"product": {
"name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.s390x",
"product_id": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-debuginfo@21.12.0-142.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.s390x",
"product": {
"name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.s390x",
"product_id": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-host-debuginfo@21.12.0-142.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.s390x",
"product": {
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.s390x",
"product_id": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-vtep-debuginfo@21.12.0-142.el8fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-0:21.12.0-142.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.aarch64"
},
"product_reference": "ovn-2021-0:21.12.0-142.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-0:21.12.0-142.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.ppc64le"
},
"product_reference": "ovn-2021-0:21.12.0-142.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-0:21.12.0-142.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.s390x"
},
"product_reference": "ovn-2021-0:21.12.0-142.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-0:21.12.0-142.el8fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.src"
},
"product_reference": "ovn-2021-0:21.12.0-142.el8fdp.src",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-0:21.12.0-142.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.x86_64"
},
"product_reference": "ovn-2021-0:21.12.0-142.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-central-0:21.12.0-142.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.aarch64"
},
"product_reference": "ovn-2021-central-0:21.12.0-142.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-central-0:21.12.0-142.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.ppc64le"
},
"product_reference": "ovn-2021-central-0:21.12.0-142.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-central-0:21.12.0-142.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.s390x"
},
"product_reference": "ovn-2021-central-0:21.12.0-142.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-central-0:21.12.0-142.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.x86_64"
},
"product_reference": "ovn-2021-central-0:21.12.0-142.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.aarch64"
},
"product_reference": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.ppc64le"
},
"product_reference": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.s390x"
},
"product_reference": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.x86_64"
},
"product_reference": "ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.aarch64"
},
"product_reference": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.ppc64le"
},
"product_reference": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.s390x"
},
"product_reference": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.x86_64"
},
"product_reference": "ovn-2021-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.aarch64"
},
"product_reference": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.ppc64le"
},
"product_reference": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.s390x"
},
"product_reference": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.x86_64"
},
"product_reference": "ovn-2021-debugsource-0:21.12.0-142.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-host-0:21.12.0-142.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.aarch64"
},
"product_reference": "ovn-2021-host-0:21.12.0-142.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-host-0:21.12.0-142.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.ppc64le"
},
"product_reference": "ovn-2021-host-0:21.12.0-142.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-host-0:21.12.0-142.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.s390x"
},
"product_reference": "ovn-2021-host-0:21.12.0-142.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-host-0:21.12.0-142.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.x86_64"
},
"product_reference": "ovn-2021-host-0:21.12.0-142.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.aarch64"
},
"product_reference": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.ppc64le"
},
"product_reference": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.s390x"
},
"product_reference": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.x86_64"
},
"product_reference": "ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.aarch64"
},
"product_reference": "ovn-2021-vtep-0:21.12.0-142.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.ppc64le"
},
"product_reference": "ovn-2021-vtep-0:21.12.0-142.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.s390x"
},
"product_reference": "ovn-2021-vtep-0:21.12.0-142.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-vtep-0:21.12.0-142.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.x86_64"
},
"product_reference": "ovn-2021-vtep-0:21.12.0-142.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.aarch64"
},
"product_reference": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.ppc64le"
},
"product_reference": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.s390x"
},
"product_reference": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.x86_64"
},
"product_reference": "ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Frode Nordahl"
],
"organization": "Canonical"
}
],
"cve": "CVE-2024-2182",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2024-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: insufficient validation of BFD packets may lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.src",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"category": "external",
"summary": "RHBZ#2267840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2182"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182"
},
{
"category": "external",
"summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html",
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5",
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
}
],
"release_date": "2024-03-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-20T16:25:16+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.src",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4035"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.src",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-142.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-142.el8fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ovn: insufficient validation of BFD packets may lead to denial of service"
}
]
}
RHSA-2024:1385
Vulnerability from csaf_redhat - Published: 2024-03-19 15:40 - Updated: 2025-11-21 18:57Summary
Red Hat Security Advisory: ovn23.06 security update
Notes
Topic
An update for ovn23.06 is now available in Fast Datapath for Red Hat
Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn23.06: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ovn23.06 is now available in Fast Datapath for Red Hat\nEnterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn23.06: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1385",
"url": "https://access.redhat.com/errata/RHSA-2024:1385"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1385.json"
}
],
"title": "Red Hat Security Advisory: ovn23.06 security update",
"tracking": {
"current_release_date": "2025-11-21T18:57:26+00:00",
"generator": {
"date": "2025-11-21T18:57:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:1385",
"initial_release_date": "2024-03-19T15:40:19+00:00",
"revision_history": [
{
"date": "2024-03-19T15:40:19+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-03-19T15:40:19+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:57:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fast Datapath for Red Hat Enterprise Linux 8",
"product": {
"name": "Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::fastdatapath"
}
}
}
],
"category": "product_family",
"name": "Fast Datapath"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.1-112.el8fdp.src",
"product": {
"name": "ovn23.06-0:23.06.1-112.el8fdp.src",
"product_id": "ovn23.06-0:23.06.1-112.el8fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el8fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.1-112.el8fdp.x86_64",
"product": {
"name": "ovn23.06-0:23.06.1-112.el8fdp.x86_64",
"product_id": "ovn23.06-0:23.06.1-112.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-0:23.06.1-112.el8fdp.x86_64",
"product": {
"name": "ovn23.06-central-0:23.06.1-112.el8fdp.x86_64",
"product_id": "ovn23.06-central-0:23.06.1-112.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central@23.06.1-112.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-0:23.06.1-112.el8fdp.x86_64",
"product": {
"name": "ovn23.06-host-0:23.06.1-112.el8fdp.x86_64",
"product_id": "ovn23.06-host-0:23.06.1-112.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host@23.06.1-112.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.x86_64",
"product": {
"name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.x86_64",
"product_id": "ovn23.06-vtep-0:23.06.1-112.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.1-112.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.x86_64",
"product": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.x86_64",
"product_id": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.1-112.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"product": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"product_id": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.1-112.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"product": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"product_id": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.1-112.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"product": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"product_id": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.1-112.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"product": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"product_id": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.1-112.el8fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.1-112.el8fdp.ppc64le",
"product": {
"name": "ovn23.06-0:23.06.1-112.el8fdp.ppc64le",
"product_id": "ovn23.06-0:23.06.1-112.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-0:23.06.1-112.el8fdp.ppc64le",
"product": {
"name": "ovn23.06-central-0:23.06.1-112.el8fdp.ppc64le",
"product_id": "ovn23.06-central-0:23.06.1-112.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central@23.06.1-112.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-0:23.06.1-112.el8fdp.ppc64le",
"product": {
"name": "ovn23.06-host-0:23.06.1-112.el8fdp.ppc64le",
"product_id": "ovn23.06-host-0:23.06.1-112.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host@23.06.1-112.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.ppc64le",
"product": {
"name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.ppc64le",
"product_id": "ovn23.06-vtep-0:23.06.1-112.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.1-112.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.ppc64le",
"product": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.ppc64le",
"product_id": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.1-112.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"product": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"product_id": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.1-112.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"product": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"product_id": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.1-112.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"product": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"product_id": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.1-112.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"product": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"product_id": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.1-112.el8fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.1-112.el8fdp.aarch64",
"product": {
"name": "ovn23.06-0:23.06.1-112.el8fdp.aarch64",
"product_id": "ovn23.06-0:23.06.1-112.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-0:23.06.1-112.el8fdp.aarch64",
"product": {
"name": "ovn23.06-central-0:23.06.1-112.el8fdp.aarch64",
"product_id": "ovn23.06-central-0:23.06.1-112.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central@23.06.1-112.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-0:23.06.1-112.el8fdp.aarch64",
"product": {
"name": "ovn23.06-host-0:23.06.1-112.el8fdp.aarch64",
"product_id": "ovn23.06-host-0:23.06.1-112.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host@23.06.1-112.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.aarch64",
"product": {
"name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.aarch64",
"product_id": "ovn23.06-vtep-0:23.06.1-112.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.1-112.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.aarch64",
"product": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.aarch64",
"product_id": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.1-112.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"product": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"product_id": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.1-112.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"product": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"product_id": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.1-112.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"product": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"product_id": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.1-112.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"product": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"product_id": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.1-112.el8fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.1-112.el8fdp.s390x",
"product": {
"name": "ovn23.06-0:23.06.1-112.el8fdp.s390x",
"product_id": "ovn23.06-0:23.06.1-112.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-0:23.06.1-112.el8fdp.s390x",
"product": {
"name": "ovn23.06-central-0:23.06.1-112.el8fdp.s390x",
"product_id": "ovn23.06-central-0:23.06.1-112.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central@23.06.1-112.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-0:23.06.1-112.el8fdp.s390x",
"product": {
"name": "ovn23.06-host-0:23.06.1-112.el8fdp.s390x",
"product_id": "ovn23.06-host-0:23.06.1-112.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host@23.06.1-112.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.s390x",
"product": {
"name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.s390x",
"product_id": "ovn23.06-vtep-0:23.06.1-112.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.1-112.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.s390x",
"product": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.s390x",
"product_id": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.1-112.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.s390x",
"product": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.s390x",
"product_id": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.1-112.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.s390x",
"product": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.s390x",
"product_id": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.1-112.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.s390x",
"product": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.s390x",
"product_id": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.1-112.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.s390x",
"product": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.s390x",
"product_id": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.1-112.el8fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.1-112.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.aarch64"
},
"product_reference": "ovn23.06-0:23.06.1-112.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.1-112.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.ppc64le"
},
"product_reference": "ovn23.06-0:23.06.1-112.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.1-112.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.s390x"
},
"product_reference": "ovn23.06-0:23.06.1-112.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.1-112.el8fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.src"
},
"product_reference": "ovn23.06-0:23.06.1-112.el8fdp.src",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.1-112.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.x86_64"
},
"product_reference": "ovn23.06-0:23.06.1-112.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-0:23.06.1-112.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.aarch64"
},
"product_reference": "ovn23.06-central-0:23.06.1-112.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-0:23.06.1-112.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.ppc64le"
},
"product_reference": "ovn23.06-central-0:23.06.1-112.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-0:23.06.1-112.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.s390x"
},
"product_reference": "ovn23.06-central-0:23.06.1-112.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-0:23.06.1-112.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.x86_64"
},
"product_reference": "ovn23.06-central-0:23.06.1-112.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.aarch64"
},
"product_reference": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.ppc64le"
},
"product_reference": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.s390x"
},
"product_reference": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.x86_64"
},
"product_reference": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.aarch64"
},
"product_reference": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.ppc64le"
},
"product_reference": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.s390x"
},
"product_reference": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.x86_64"
},
"product_reference": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.aarch64"
},
"product_reference": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.ppc64le"
},
"product_reference": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.s390x"
},
"product_reference": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.x86_64"
},
"product_reference": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-0:23.06.1-112.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.aarch64"
},
"product_reference": "ovn23.06-host-0:23.06.1-112.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-0:23.06.1-112.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.ppc64le"
},
"product_reference": "ovn23.06-host-0:23.06.1-112.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-0:23.06.1-112.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.s390x"
},
"product_reference": "ovn23.06-host-0:23.06.1-112.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-0:23.06.1-112.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.x86_64"
},
"product_reference": "ovn23.06-host-0:23.06.1-112.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.aarch64"
},
"product_reference": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.ppc64le"
},
"product_reference": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.s390x"
},
"product_reference": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.x86_64"
},
"product_reference": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.aarch64"
},
"product_reference": "ovn23.06-vtep-0:23.06.1-112.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.ppc64le"
},
"product_reference": "ovn23.06-vtep-0:23.06.1-112.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.s390x"
},
"product_reference": "ovn23.06-vtep-0:23.06.1-112.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.x86_64"
},
"product_reference": "ovn23.06-vtep-0:23.06.1-112.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.aarch64"
},
"product_reference": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.ppc64le"
},
"product_reference": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.s390x"
},
"product_reference": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.x86_64"
},
"product_reference": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Frode Nordahl"
],
"organization": "Canonical"
}
],
"cve": "CVE-2024-2182",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2024-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: insufficient validation of BFD packets may lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.src",
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"category": "external",
"summary": "RHBZ#2267840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2182"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182"
},
{
"category": "external",
"summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html",
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5",
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
}
],
"release_date": "2024-03-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:40:19+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.src",
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1385"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.src",
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ovn: insufficient validation of BFD packets may lead to denial of service"
}
]
}
RHSA-2024_1393
Vulnerability from csaf_redhat - Published: 2024-03-19 15:47 - Updated: 2024-11-15 16:10Summary
Red Hat Security Advisory: ovn22.03 security update
Notes
Topic
An update for ovn22.03 is now available in Fast Datapath for Red Hat
Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn22.03: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ovn22.03 is now available in Fast Datapath for Red Hat\nEnterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn22.03: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1393",
"url": "https://access.redhat.com/errata/RHSA-2024:1393"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1393.json"
}
],
"title": "Red Hat Security Advisory: ovn22.03 security update",
"tracking": {
"current_release_date": "2024-11-15T16:10:24+00:00",
"generator": {
"date": "2024-11-15T16:10:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:1393",
"initial_release_date": "2024-03-19T15:47:23+00:00",
"revision_history": [
{
"date": "2024-03-19T15:47:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-03-19T15:47:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T16:10:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product": {
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::fastdatapath"
}
}
}
],
"category": "product_family",
"name": "Fast Datapath"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.03-0:22.03.3-71.el9fdp.src",
"product": {
"name": "ovn22.03-0:22.03.3-71.el9fdp.src",
"product_id": "ovn22.03-0:22.03.3-71.el9fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el9fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.03-0:22.03.3-71.el9fdp.x86_64",
"product": {
"name": "ovn22.03-0:22.03.3-71.el9fdp.x86_64",
"product_id": "ovn22.03-0:22.03.3-71.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-0:22.03.3-71.el9fdp.x86_64",
"product": {
"name": "ovn22.03-central-0:22.03.3-71.el9fdp.x86_64",
"product_id": "ovn22.03-central-0:22.03.3-71.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central@22.03.3-71.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-0:22.03.3-71.el9fdp.x86_64",
"product": {
"name": "ovn22.03-host-0:22.03.3-71.el9fdp.x86_64",
"product_id": "ovn22.03-host-0:22.03.3-71.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host@22.03.3-71.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.x86_64",
"product": {
"name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.x86_64",
"product_id": "ovn22.03-vtep-0:22.03.3-71.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.3-71.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.x86_64",
"product": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.x86_64",
"product_id": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.3-71.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"product": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"product_id": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.3-71.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"product": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"product_id": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.3-71.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"product": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"product_id": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.3-71.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"product": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"product_id": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.3-71.el9fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.03-0:22.03.3-71.el9fdp.ppc64le",
"product": {
"name": "ovn22.03-0:22.03.3-71.el9fdp.ppc64le",
"product_id": "ovn22.03-0:22.03.3-71.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-0:22.03.3-71.el9fdp.ppc64le",
"product": {
"name": "ovn22.03-central-0:22.03.3-71.el9fdp.ppc64le",
"product_id": "ovn22.03-central-0:22.03.3-71.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central@22.03.3-71.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-0:22.03.3-71.el9fdp.ppc64le",
"product": {
"name": "ovn22.03-host-0:22.03.3-71.el9fdp.ppc64le",
"product_id": "ovn22.03-host-0:22.03.3-71.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host@22.03.3-71.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.ppc64le",
"product": {
"name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.ppc64le",
"product_id": "ovn22.03-vtep-0:22.03.3-71.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.3-71.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.ppc64le",
"product": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.ppc64le",
"product_id": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.3-71.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"product": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"product_id": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.3-71.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"product": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"product_id": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.3-71.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"product": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"product_id": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.3-71.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"product": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"product_id": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.3-71.el9fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.03-0:22.03.3-71.el9fdp.aarch64",
"product": {
"name": "ovn22.03-0:22.03.3-71.el9fdp.aarch64",
"product_id": "ovn22.03-0:22.03.3-71.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-0:22.03.3-71.el9fdp.aarch64",
"product": {
"name": "ovn22.03-central-0:22.03.3-71.el9fdp.aarch64",
"product_id": "ovn22.03-central-0:22.03.3-71.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central@22.03.3-71.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-0:22.03.3-71.el9fdp.aarch64",
"product": {
"name": "ovn22.03-host-0:22.03.3-71.el9fdp.aarch64",
"product_id": "ovn22.03-host-0:22.03.3-71.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host@22.03.3-71.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.aarch64",
"product": {
"name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.aarch64",
"product_id": "ovn22.03-vtep-0:22.03.3-71.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.3-71.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.aarch64",
"product": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.aarch64",
"product_id": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.3-71.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"product": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"product_id": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.3-71.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"product": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"product_id": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.3-71.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"product": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"product_id": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.3-71.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"product": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"product_id": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.3-71.el9fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.03-0:22.03.3-71.el9fdp.s390x",
"product": {
"name": "ovn22.03-0:22.03.3-71.el9fdp.s390x",
"product_id": "ovn22.03-0:22.03.3-71.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-0:22.03.3-71.el9fdp.s390x",
"product": {
"name": "ovn22.03-central-0:22.03.3-71.el9fdp.s390x",
"product_id": "ovn22.03-central-0:22.03.3-71.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central@22.03.3-71.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-0:22.03.3-71.el9fdp.s390x",
"product": {
"name": "ovn22.03-host-0:22.03.3-71.el9fdp.s390x",
"product_id": "ovn22.03-host-0:22.03.3-71.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host@22.03.3-71.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.s390x",
"product": {
"name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.s390x",
"product_id": "ovn22.03-vtep-0:22.03.3-71.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.3-71.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.s390x",
"product": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.s390x",
"product_id": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.3-71.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.s390x",
"product": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.s390x",
"product_id": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.3-71.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.s390x",
"product": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.s390x",
"product_id": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.3-71.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.s390x",
"product": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.s390x",
"product_id": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.3-71.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.s390x",
"product": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.s390x",
"product_id": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.3-71.el9fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-0:22.03.3-71.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.aarch64"
},
"product_reference": "ovn22.03-0:22.03.3-71.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-0:22.03.3-71.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.ppc64le"
},
"product_reference": "ovn22.03-0:22.03.3-71.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-0:22.03.3-71.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.s390x"
},
"product_reference": "ovn22.03-0:22.03.3-71.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-0:22.03.3-71.el9fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.src"
},
"product_reference": "ovn22.03-0:22.03.3-71.el9fdp.src",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-0:22.03.3-71.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.x86_64"
},
"product_reference": "ovn22.03-0:22.03.3-71.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-0:22.03.3-71.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.aarch64"
},
"product_reference": "ovn22.03-central-0:22.03.3-71.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-0:22.03.3-71.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.ppc64le"
},
"product_reference": "ovn22.03-central-0:22.03.3-71.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-0:22.03.3-71.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.s390x"
},
"product_reference": "ovn22.03-central-0:22.03.3-71.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-0:22.03.3-71.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.x86_64"
},
"product_reference": "ovn22.03-central-0:22.03.3-71.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.aarch64"
},
"product_reference": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.ppc64le"
},
"product_reference": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.s390x"
},
"product_reference": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.x86_64"
},
"product_reference": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.aarch64"
},
"product_reference": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.ppc64le"
},
"product_reference": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.s390x"
},
"product_reference": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.x86_64"
},
"product_reference": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.aarch64"
},
"product_reference": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.ppc64le"
},
"product_reference": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.s390x"
},
"product_reference": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.x86_64"
},
"product_reference": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-0:22.03.3-71.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.aarch64"
},
"product_reference": "ovn22.03-host-0:22.03.3-71.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-0:22.03.3-71.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.ppc64le"
},
"product_reference": "ovn22.03-host-0:22.03.3-71.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-0:22.03.3-71.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.s390x"
},
"product_reference": "ovn22.03-host-0:22.03.3-71.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-0:22.03.3-71.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.x86_64"
},
"product_reference": "ovn22.03-host-0:22.03.3-71.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.aarch64"
},
"product_reference": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.ppc64le"
},
"product_reference": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.s390x"
},
"product_reference": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.x86_64"
},
"product_reference": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.aarch64"
},
"product_reference": "ovn22.03-vtep-0:22.03.3-71.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.ppc64le"
},
"product_reference": "ovn22.03-vtep-0:22.03.3-71.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.s390x"
},
"product_reference": "ovn22.03-vtep-0:22.03.3-71.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.x86_64"
},
"product_reference": "ovn22.03-vtep-0:22.03.3-71.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.aarch64"
},
"product_reference": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.ppc64le"
},
"product_reference": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.s390x"
},
"product_reference": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.x86_64"
},
"product_reference": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Frode Nordahl"
],
"organization": "Canonical"
}
],
"cve": "CVE-2024-2182",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2024-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: insufficient validation of BFD packets may lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.src",
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"category": "external",
"summary": "RHBZ#2267840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2182"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182"
},
{
"category": "external",
"summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html",
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5",
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
}
],
"release_date": "2024-03-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:47:23+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.src",
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1393"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.src",
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ovn: insufficient validation of BFD packets may lead to denial of service"
}
]
}
RHSA-2024_1385
Vulnerability from csaf_redhat - Published: 2024-03-19 15:40 - Updated: 2024-11-15 16:11Summary
Red Hat Security Advisory: ovn23.06 security update
Notes
Topic
An update for ovn23.06 is now available in Fast Datapath for Red Hat
Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn23.06: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ovn23.06 is now available in Fast Datapath for Red Hat\nEnterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn23.06: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1385",
"url": "https://access.redhat.com/errata/RHSA-2024:1385"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1385.json"
}
],
"title": "Red Hat Security Advisory: ovn23.06 security update",
"tracking": {
"current_release_date": "2024-11-15T16:11:33+00:00",
"generator": {
"date": "2024-11-15T16:11:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:1385",
"initial_release_date": "2024-03-19T15:40:19+00:00",
"revision_history": [
{
"date": "2024-03-19T15:40:19+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-03-19T15:40:19+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T16:11:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fast Datapath for Red Hat Enterprise Linux 8",
"product": {
"name": "Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::fastdatapath"
}
}
}
],
"category": "product_family",
"name": "Fast Datapath"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.1-112.el8fdp.src",
"product": {
"name": "ovn23.06-0:23.06.1-112.el8fdp.src",
"product_id": "ovn23.06-0:23.06.1-112.el8fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el8fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.1-112.el8fdp.x86_64",
"product": {
"name": "ovn23.06-0:23.06.1-112.el8fdp.x86_64",
"product_id": "ovn23.06-0:23.06.1-112.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-0:23.06.1-112.el8fdp.x86_64",
"product": {
"name": "ovn23.06-central-0:23.06.1-112.el8fdp.x86_64",
"product_id": "ovn23.06-central-0:23.06.1-112.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central@23.06.1-112.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-0:23.06.1-112.el8fdp.x86_64",
"product": {
"name": "ovn23.06-host-0:23.06.1-112.el8fdp.x86_64",
"product_id": "ovn23.06-host-0:23.06.1-112.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host@23.06.1-112.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.x86_64",
"product": {
"name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.x86_64",
"product_id": "ovn23.06-vtep-0:23.06.1-112.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.1-112.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.x86_64",
"product": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.x86_64",
"product_id": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.1-112.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"product": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"product_id": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.1-112.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"product": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"product_id": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.1-112.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"product": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"product_id": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.1-112.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"product": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"product_id": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.1-112.el8fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.1-112.el8fdp.ppc64le",
"product": {
"name": "ovn23.06-0:23.06.1-112.el8fdp.ppc64le",
"product_id": "ovn23.06-0:23.06.1-112.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-0:23.06.1-112.el8fdp.ppc64le",
"product": {
"name": "ovn23.06-central-0:23.06.1-112.el8fdp.ppc64le",
"product_id": "ovn23.06-central-0:23.06.1-112.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central@23.06.1-112.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-0:23.06.1-112.el8fdp.ppc64le",
"product": {
"name": "ovn23.06-host-0:23.06.1-112.el8fdp.ppc64le",
"product_id": "ovn23.06-host-0:23.06.1-112.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host@23.06.1-112.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.ppc64le",
"product": {
"name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.ppc64le",
"product_id": "ovn23.06-vtep-0:23.06.1-112.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.1-112.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.ppc64le",
"product": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.ppc64le",
"product_id": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.1-112.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"product": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"product_id": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.1-112.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"product": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"product_id": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.1-112.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"product": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"product_id": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.1-112.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"product": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"product_id": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.1-112.el8fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.1-112.el8fdp.aarch64",
"product": {
"name": "ovn23.06-0:23.06.1-112.el8fdp.aarch64",
"product_id": "ovn23.06-0:23.06.1-112.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-0:23.06.1-112.el8fdp.aarch64",
"product": {
"name": "ovn23.06-central-0:23.06.1-112.el8fdp.aarch64",
"product_id": "ovn23.06-central-0:23.06.1-112.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central@23.06.1-112.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-0:23.06.1-112.el8fdp.aarch64",
"product": {
"name": "ovn23.06-host-0:23.06.1-112.el8fdp.aarch64",
"product_id": "ovn23.06-host-0:23.06.1-112.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host@23.06.1-112.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.aarch64",
"product": {
"name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.aarch64",
"product_id": "ovn23.06-vtep-0:23.06.1-112.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.1-112.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.aarch64",
"product": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.aarch64",
"product_id": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.1-112.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"product": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"product_id": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.1-112.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"product": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"product_id": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.1-112.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"product": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"product_id": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.1-112.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"product": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"product_id": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.1-112.el8fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.1-112.el8fdp.s390x",
"product": {
"name": "ovn23.06-0:23.06.1-112.el8fdp.s390x",
"product_id": "ovn23.06-0:23.06.1-112.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.1-112.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-0:23.06.1-112.el8fdp.s390x",
"product": {
"name": "ovn23.06-central-0:23.06.1-112.el8fdp.s390x",
"product_id": "ovn23.06-central-0:23.06.1-112.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central@23.06.1-112.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-0:23.06.1-112.el8fdp.s390x",
"product": {
"name": "ovn23.06-host-0:23.06.1-112.el8fdp.s390x",
"product_id": "ovn23.06-host-0:23.06.1-112.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host@23.06.1-112.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.s390x",
"product": {
"name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.s390x",
"product_id": "ovn23.06-vtep-0:23.06.1-112.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.1-112.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.s390x",
"product": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.s390x",
"product_id": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.1-112.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.s390x",
"product": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.s390x",
"product_id": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.1-112.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.s390x",
"product": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.s390x",
"product_id": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.1-112.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.s390x",
"product": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.s390x",
"product_id": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.1-112.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.s390x",
"product": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.s390x",
"product_id": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.1-112.el8fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.1-112.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.aarch64"
},
"product_reference": "ovn23.06-0:23.06.1-112.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.1-112.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.ppc64le"
},
"product_reference": "ovn23.06-0:23.06.1-112.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.1-112.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.s390x"
},
"product_reference": "ovn23.06-0:23.06.1-112.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.1-112.el8fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.src"
},
"product_reference": "ovn23.06-0:23.06.1-112.el8fdp.src",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.1-112.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.x86_64"
},
"product_reference": "ovn23.06-0:23.06.1-112.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-0:23.06.1-112.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.aarch64"
},
"product_reference": "ovn23.06-central-0:23.06.1-112.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-0:23.06.1-112.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.ppc64le"
},
"product_reference": "ovn23.06-central-0:23.06.1-112.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-0:23.06.1-112.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.s390x"
},
"product_reference": "ovn23.06-central-0:23.06.1-112.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-0:23.06.1-112.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.x86_64"
},
"product_reference": "ovn23.06-central-0:23.06.1-112.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.aarch64"
},
"product_reference": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.ppc64le"
},
"product_reference": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.s390x"
},
"product_reference": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.x86_64"
},
"product_reference": "ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.aarch64"
},
"product_reference": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.ppc64le"
},
"product_reference": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.s390x"
},
"product_reference": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.x86_64"
},
"product_reference": "ovn23.06-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.aarch64"
},
"product_reference": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.ppc64le"
},
"product_reference": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.s390x"
},
"product_reference": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.x86_64"
},
"product_reference": "ovn23.06-debugsource-0:23.06.1-112.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-0:23.06.1-112.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.aarch64"
},
"product_reference": "ovn23.06-host-0:23.06.1-112.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-0:23.06.1-112.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.ppc64le"
},
"product_reference": "ovn23.06-host-0:23.06.1-112.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-0:23.06.1-112.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.s390x"
},
"product_reference": "ovn23.06-host-0:23.06.1-112.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-0:23.06.1-112.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.x86_64"
},
"product_reference": "ovn23.06-host-0:23.06.1-112.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.aarch64"
},
"product_reference": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.ppc64le"
},
"product_reference": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.s390x"
},
"product_reference": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.x86_64"
},
"product_reference": "ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.aarch64"
},
"product_reference": "ovn23.06-vtep-0:23.06.1-112.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.ppc64le"
},
"product_reference": "ovn23.06-vtep-0:23.06.1-112.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.s390x"
},
"product_reference": "ovn23.06-vtep-0:23.06.1-112.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-0:23.06.1-112.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.x86_64"
},
"product_reference": "ovn23.06-vtep-0:23.06.1-112.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.aarch64"
},
"product_reference": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.ppc64le"
},
"product_reference": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.s390x"
},
"product_reference": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.x86_64"
},
"product_reference": "ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Frode Nordahl"
],
"organization": "Canonical"
}
],
"cve": "CVE-2024-2182",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2024-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: insufficient validation of BFD packets may lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.src",
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"category": "external",
"summary": "RHBZ#2267840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2182"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182"
},
{
"category": "external",
"summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html",
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5",
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
}
],
"release_date": "2024-03-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:40:19+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.src",
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1385"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.src",
"8Base-Fast-Datapath:ovn23.06-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.1-112.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.1-112.el8fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ovn: insufficient validation of BFD packets may lead to denial of service"
}
]
}
RHSA-2024_1387
Vulnerability from csaf_redhat - Published: 2024-03-19 15:39 - Updated: 2024-11-15 16:11Summary
Red Hat Security Advisory: ovn22.03 security update
Notes
Topic
An update for ovn22.03 is now available in Fast Datapath for Red Hat
Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn22.03: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ovn22.03 is now available in Fast Datapath for Red Hat\nEnterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn22.03: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1387",
"url": "https://access.redhat.com/errata/RHSA-2024:1387"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1387.json"
}
],
"title": "Red Hat Security Advisory: ovn22.03 security update",
"tracking": {
"current_release_date": "2024-11-15T16:11:23+00:00",
"generator": {
"date": "2024-11-15T16:11:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:1387",
"initial_release_date": "2024-03-19T15:39:52+00:00",
"revision_history": [
{
"date": "2024-03-19T15:39:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-03-19T15:39:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T16:11:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fast Datapath for Red Hat Enterprise Linux 8",
"product": {
"name": "Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::fastdatapath"
}
}
}
],
"category": "product_family",
"name": "Fast Datapath"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.03-0:22.03.3-71.el8fdp.src",
"product": {
"name": "ovn22.03-0:22.03.3-71.el8fdp.src",
"product_id": "ovn22.03-0:22.03.3-71.el8fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el8fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.03-0:22.03.3-71.el8fdp.x86_64",
"product": {
"name": "ovn22.03-0:22.03.3-71.el8fdp.x86_64",
"product_id": "ovn22.03-0:22.03.3-71.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-0:22.03.3-71.el8fdp.x86_64",
"product": {
"name": "ovn22.03-central-0:22.03.3-71.el8fdp.x86_64",
"product_id": "ovn22.03-central-0:22.03.3-71.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central@22.03.3-71.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-0:22.03.3-71.el8fdp.x86_64",
"product": {
"name": "ovn22.03-host-0:22.03.3-71.el8fdp.x86_64",
"product_id": "ovn22.03-host-0:22.03.3-71.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host@22.03.3-71.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.x86_64",
"product": {
"name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.x86_64",
"product_id": "ovn22.03-vtep-0:22.03.3-71.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.3-71.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.x86_64",
"product": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.x86_64",
"product_id": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.3-71.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"product": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"product_id": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.3-71.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"product": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"product_id": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.3-71.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"product": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"product_id": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.3-71.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"product": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"product_id": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.3-71.el8fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.03-0:22.03.3-71.el8fdp.ppc64le",
"product": {
"name": "ovn22.03-0:22.03.3-71.el8fdp.ppc64le",
"product_id": "ovn22.03-0:22.03.3-71.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-0:22.03.3-71.el8fdp.ppc64le",
"product": {
"name": "ovn22.03-central-0:22.03.3-71.el8fdp.ppc64le",
"product_id": "ovn22.03-central-0:22.03.3-71.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central@22.03.3-71.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-0:22.03.3-71.el8fdp.ppc64le",
"product": {
"name": "ovn22.03-host-0:22.03.3-71.el8fdp.ppc64le",
"product_id": "ovn22.03-host-0:22.03.3-71.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host@22.03.3-71.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.ppc64le",
"product": {
"name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.ppc64le",
"product_id": "ovn22.03-vtep-0:22.03.3-71.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.3-71.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.ppc64le",
"product": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.ppc64le",
"product_id": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.3-71.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"product": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"product_id": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.3-71.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"product": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"product_id": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.3-71.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"product": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"product_id": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.3-71.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"product": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"product_id": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.3-71.el8fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.03-0:22.03.3-71.el8fdp.aarch64",
"product": {
"name": "ovn22.03-0:22.03.3-71.el8fdp.aarch64",
"product_id": "ovn22.03-0:22.03.3-71.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-0:22.03.3-71.el8fdp.aarch64",
"product": {
"name": "ovn22.03-central-0:22.03.3-71.el8fdp.aarch64",
"product_id": "ovn22.03-central-0:22.03.3-71.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central@22.03.3-71.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-0:22.03.3-71.el8fdp.aarch64",
"product": {
"name": "ovn22.03-host-0:22.03.3-71.el8fdp.aarch64",
"product_id": "ovn22.03-host-0:22.03.3-71.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host@22.03.3-71.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.aarch64",
"product": {
"name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.aarch64",
"product_id": "ovn22.03-vtep-0:22.03.3-71.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.3-71.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.aarch64",
"product": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.aarch64",
"product_id": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.3-71.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"product": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"product_id": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.3-71.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"product": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"product_id": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.3-71.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"product": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"product_id": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.3-71.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"product": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"product_id": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.3-71.el8fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.03-0:22.03.3-71.el8fdp.s390x",
"product": {
"name": "ovn22.03-0:22.03.3-71.el8fdp.s390x",
"product_id": "ovn22.03-0:22.03.3-71.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-0:22.03.3-71.el8fdp.s390x",
"product": {
"name": "ovn22.03-central-0:22.03.3-71.el8fdp.s390x",
"product_id": "ovn22.03-central-0:22.03.3-71.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central@22.03.3-71.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-0:22.03.3-71.el8fdp.s390x",
"product": {
"name": "ovn22.03-host-0:22.03.3-71.el8fdp.s390x",
"product_id": "ovn22.03-host-0:22.03.3-71.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host@22.03.3-71.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.s390x",
"product": {
"name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.s390x",
"product_id": "ovn22.03-vtep-0:22.03.3-71.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.3-71.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.s390x",
"product": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.s390x",
"product_id": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.3-71.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.s390x",
"product": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.s390x",
"product_id": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.3-71.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.s390x",
"product": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.s390x",
"product_id": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.3-71.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.s390x",
"product": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.s390x",
"product_id": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.3-71.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.s390x",
"product": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.s390x",
"product_id": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.3-71.el8fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-0:22.03.3-71.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.aarch64"
},
"product_reference": "ovn22.03-0:22.03.3-71.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-0:22.03.3-71.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.ppc64le"
},
"product_reference": "ovn22.03-0:22.03.3-71.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-0:22.03.3-71.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.s390x"
},
"product_reference": "ovn22.03-0:22.03.3-71.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-0:22.03.3-71.el8fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.src"
},
"product_reference": "ovn22.03-0:22.03.3-71.el8fdp.src",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-0:22.03.3-71.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.x86_64"
},
"product_reference": "ovn22.03-0:22.03.3-71.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-0:22.03.3-71.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.aarch64"
},
"product_reference": "ovn22.03-central-0:22.03.3-71.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-0:22.03.3-71.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.ppc64le"
},
"product_reference": "ovn22.03-central-0:22.03.3-71.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-0:22.03.3-71.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.s390x"
},
"product_reference": "ovn22.03-central-0:22.03.3-71.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-0:22.03.3-71.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.x86_64"
},
"product_reference": "ovn22.03-central-0:22.03.3-71.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.aarch64"
},
"product_reference": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.ppc64le"
},
"product_reference": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.s390x"
},
"product_reference": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.x86_64"
},
"product_reference": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.aarch64"
},
"product_reference": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.ppc64le"
},
"product_reference": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.s390x"
},
"product_reference": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.x86_64"
},
"product_reference": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.aarch64"
},
"product_reference": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.ppc64le"
},
"product_reference": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.s390x"
},
"product_reference": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.x86_64"
},
"product_reference": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-0:22.03.3-71.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.aarch64"
},
"product_reference": "ovn22.03-host-0:22.03.3-71.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-0:22.03.3-71.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.ppc64le"
},
"product_reference": "ovn22.03-host-0:22.03.3-71.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-0:22.03.3-71.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.s390x"
},
"product_reference": "ovn22.03-host-0:22.03.3-71.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-0:22.03.3-71.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.x86_64"
},
"product_reference": "ovn22.03-host-0:22.03.3-71.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.aarch64"
},
"product_reference": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.ppc64le"
},
"product_reference": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.s390x"
},
"product_reference": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.x86_64"
},
"product_reference": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.aarch64"
},
"product_reference": "ovn22.03-vtep-0:22.03.3-71.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.ppc64le"
},
"product_reference": "ovn22.03-vtep-0:22.03.3-71.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.s390x"
},
"product_reference": "ovn22.03-vtep-0:22.03.3-71.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.x86_64"
},
"product_reference": "ovn22.03-vtep-0:22.03.3-71.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.aarch64"
},
"product_reference": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.ppc64le"
},
"product_reference": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.s390x"
},
"product_reference": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.x86_64"
},
"product_reference": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Frode Nordahl"
],
"organization": "Canonical"
}
],
"cve": "CVE-2024-2182",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2024-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: insufficient validation of BFD packets may lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.src",
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"category": "external",
"summary": "RHBZ#2267840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2182"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182"
},
{
"category": "external",
"summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html",
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5",
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
}
],
"release_date": "2024-03-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:39:52+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.src",
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1387"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.src",
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ovn: insufficient validation of BFD packets may lead to denial of service"
}
]
}
RHSA-2024:1393
Vulnerability from csaf_redhat - Published: 2024-03-19 15:47 - Updated: 2025-11-21 18:57Summary
Red Hat Security Advisory: ovn22.03 security update
Notes
Topic
An update for ovn22.03 is now available in Fast Datapath for Red Hat
Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn22.03: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ovn22.03 is now available in Fast Datapath for Red Hat\nEnterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn22.03: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1393",
"url": "https://access.redhat.com/errata/RHSA-2024:1393"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1393.json"
}
],
"title": "Red Hat Security Advisory: ovn22.03 security update",
"tracking": {
"current_release_date": "2025-11-21T18:57:28+00:00",
"generator": {
"date": "2025-11-21T18:57:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:1393",
"initial_release_date": "2024-03-19T15:47:23+00:00",
"revision_history": [
{
"date": "2024-03-19T15:47:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-03-19T15:47:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:57:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product": {
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::fastdatapath"
}
}
}
],
"category": "product_family",
"name": "Fast Datapath"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.03-0:22.03.3-71.el9fdp.src",
"product": {
"name": "ovn22.03-0:22.03.3-71.el9fdp.src",
"product_id": "ovn22.03-0:22.03.3-71.el9fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el9fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.03-0:22.03.3-71.el9fdp.x86_64",
"product": {
"name": "ovn22.03-0:22.03.3-71.el9fdp.x86_64",
"product_id": "ovn22.03-0:22.03.3-71.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-0:22.03.3-71.el9fdp.x86_64",
"product": {
"name": "ovn22.03-central-0:22.03.3-71.el9fdp.x86_64",
"product_id": "ovn22.03-central-0:22.03.3-71.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central@22.03.3-71.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-0:22.03.3-71.el9fdp.x86_64",
"product": {
"name": "ovn22.03-host-0:22.03.3-71.el9fdp.x86_64",
"product_id": "ovn22.03-host-0:22.03.3-71.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host@22.03.3-71.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.x86_64",
"product": {
"name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.x86_64",
"product_id": "ovn22.03-vtep-0:22.03.3-71.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.3-71.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.x86_64",
"product": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.x86_64",
"product_id": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.3-71.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"product": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"product_id": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.3-71.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"product": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"product_id": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.3-71.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"product": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"product_id": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.3-71.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"product": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"product_id": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.3-71.el9fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.03-0:22.03.3-71.el9fdp.ppc64le",
"product": {
"name": "ovn22.03-0:22.03.3-71.el9fdp.ppc64le",
"product_id": "ovn22.03-0:22.03.3-71.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-0:22.03.3-71.el9fdp.ppc64le",
"product": {
"name": "ovn22.03-central-0:22.03.3-71.el9fdp.ppc64le",
"product_id": "ovn22.03-central-0:22.03.3-71.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central@22.03.3-71.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-0:22.03.3-71.el9fdp.ppc64le",
"product": {
"name": "ovn22.03-host-0:22.03.3-71.el9fdp.ppc64le",
"product_id": "ovn22.03-host-0:22.03.3-71.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host@22.03.3-71.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.ppc64le",
"product": {
"name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.ppc64le",
"product_id": "ovn22.03-vtep-0:22.03.3-71.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.3-71.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.ppc64le",
"product": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.ppc64le",
"product_id": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.3-71.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"product": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"product_id": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.3-71.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"product": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"product_id": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.3-71.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"product": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"product_id": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.3-71.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"product": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"product_id": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.3-71.el9fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.03-0:22.03.3-71.el9fdp.aarch64",
"product": {
"name": "ovn22.03-0:22.03.3-71.el9fdp.aarch64",
"product_id": "ovn22.03-0:22.03.3-71.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-0:22.03.3-71.el9fdp.aarch64",
"product": {
"name": "ovn22.03-central-0:22.03.3-71.el9fdp.aarch64",
"product_id": "ovn22.03-central-0:22.03.3-71.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central@22.03.3-71.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-0:22.03.3-71.el9fdp.aarch64",
"product": {
"name": "ovn22.03-host-0:22.03.3-71.el9fdp.aarch64",
"product_id": "ovn22.03-host-0:22.03.3-71.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host@22.03.3-71.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.aarch64",
"product": {
"name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.aarch64",
"product_id": "ovn22.03-vtep-0:22.03.3-71.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.3-71.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.aarch64",
"product": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.aarch64",
"product_id": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.3-71.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"product": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"product_id": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.3-71.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"product": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"product_id": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.3-71.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"product": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"product_id": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.3-71.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"product": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"product_id": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.3-71.el9fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.03-0:22.03.3-71.el9fdp.s390x",
"product": {
"name": "ovn22.03-0:22.03.3-71.el9fdp.s390x",
"product_id": "ovn22.03-0:22.03.3-71.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-0:22.03.3-71.el9fdp.s390x",
"product": {
"name": "ovn22.03-central-0:22.03.3-71.el9fdp.s390x",
"product_id": "ovn22.03-central-0:22.03.3-71.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central@22.03.3-71.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-0:22.03.3-71.el9fdp.s390x",
"product": {
"name": "ovn22.03-host-0:22.03.3-71.el9fdp.s390x",
"product_id": "ovn22.03-host-0:22.03.3-71.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host@22.03.3-71.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.s390x",
"product": {
"name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.s390x",
"product_id": "ovn22.03-vtep-0:22.03.3-71.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.3-71.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.s390x",
"product": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.s390x",
"product_id": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.3-71.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.s390x",
"product": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.s390x",
"product_id": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.3-71.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.s390x",
"product": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.s390x",
"product_id": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.3-71.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.s390x",
"product": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.s390x",
"product_id": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.3-71.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.s390x",
"product": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.s390x",
"product_id": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.3-71.el9fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-0:22.03.3-71.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.aarch64"
},
"product_reference": "ovn22.03-0:22.03.3-71.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-0:22.03.3-71.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.ppc64le"
},
"product_reference": "ovn22.03-0:22.03.3-71.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-0:22.03.3-71.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.s390x"
},
"product_reference": "ovn22.03-0:22.03.3-71.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-0:22.03.3-71.el9fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.src"
},
"product_reference": "ovn22.03-0:22.03.3-71.el9fdp.src",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-0:22.03.3-71.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.x86_64"
},
"product_reference": "ovn22.03-0:22.03.3-71.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-0:22.03.3-71.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.aarch64"
},
"product_reference": "ovn22.03-central-0:22.03.3-71.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-0:22.03.3-71.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.ppc64le"
},
"product_reference": "ovn22.03-central-0:22.03.3-71.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-0:22.03.3-71.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.s390x"
},
"product_reference": "ovn22.03-central-0:22.03.3-71.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-0:22.03.3-71.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.x86_64"
},
"product_reference": "ovn22.03-central-0:22.03.3-71.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.aarch64"
},
"product_reference": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.ppc64le"
},
"product_reference": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.s390x"
},
"product_reference": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.x86_64"
},
"product_reference": "ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.aarch64"
},
"product_reference": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.ppc64le"
},
"product_reference": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.s390x"
},
"product_reference": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.x86_64"
},
"product_reference": "ovn22.03-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.aarch64"
},
"product_reference": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.ppc64le"
},
"product_reference": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.s390x"
},
"product_reference": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.x86_64"
},
"product_reference": "ovn22.03-debugsource-0:22.03.3-71.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-0:22.03.3-71.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.aarch64"
},
"product_reference": "ovn22.03-host-0:22.03.3-71.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-0:22.03.3-71.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.ppc64le"
},
"product_reference": "ovn22.03-host-0:22.03.3-71.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-0:22.03.3-71.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.s390x"
},
"product_reference": "ovn22.03-host-0:22.03.3-71.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-0:22.03.3-71.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.x86_64"
},
"product_reference": "ovn22.03-host-0:22.03.3-71.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.aarch64"
},
"product_reference": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.ppc64le"
},
"product_reference": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.s390x"
},
"product_reference": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.x86_64"
},
"product_reference": "ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.aarch64"
},
"product_reference": "ovn22.03-vtep-0:22.03.3-71.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.ppc64le"
},
"product_reference": "ovn22.03-vtep-0:22.03.3-71.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.s390x"
},
"product_reference": "ovn22.03-vtep-0:22.03.3-71.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-0:22.03.3-71.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.x86_64"
},
"product_reference": "ovn22.03-vtep-0:22.03.3-71.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.aarch64"
},
"product_reference": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.ppc64le"
},
"product_reference": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.s390x"
},
"product_reference": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.x86_64"
},
"product_reference": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Frode Nordahl"
],
"organization": "Canonical"
}
],
"cve": "CVE-2024-2182",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2024-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: insufficient validation of BFD packets may lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.src",
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"category": "external",
"summary": "RHBZ#2267840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2182"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182"
},
{
"category": "external",
"summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html",
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5",
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
}
],
"release_date": "2024-03-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:47:23+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.src",
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1393"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.src",
"9Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el9fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ovn: insufficient validation of BFD packets may lead to denial of service"
}
]
}
RHSA-2024_1392
Vulnerability from csaf_redhat - Published: 2024-03-19 15:46 - Updated: 2024-11-15 16:10Summary
Red Hat Security Advisory: ovn22.12 security update
Notes
Topic
An update for ovn22.12 is now available in Fast Datapath for Red Hat
Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn22.12: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ovn22.12 is now available in Fast Datapath for Red Hat\nEnterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn22.12: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1392",
"url": "https://access.redhat.com/errata/RHSA-2024:1392"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1392.json"
}
],
"title": "Red Hat Security Advisory: ovn22.12 security update",
"tracking": {
"current_release_date": "2024-11-15T16:10:48+00:00",
"generator": {
"date": "2024-11-15T16:10:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:1392",
"initial_release_date": "2024-03-19T15:46:20+00:00",
"revision_history": [
{
"date": "2024-03-19T15:46:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-03-19T15:46:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T16:10:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product": {
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::fastdatapath"
}
}
}
],
"category": "product_family",
"name": "Fast Datapath"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.12-0:22.12.1-94.el9fdp.src",
"product": {
"name": "ovn22.12-0:22.12.1-94.el9fdp.src",
"product_id": "ovn22.12-0:22.12.1-94.el9fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el9fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.12-0:22.12.1-94.el9fdp.x86_64",
"product": {
"name": "ovn22.12-0:22.12.1-94.el9fdp.x86_64",
"product_id": "ovn22.12-0:22.12.1-94.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-0:22.12.1-94.el9fdp.x86_64",
"product": {
"name": "ovn22.12-central-0:22.12.1-94.el9fdp.x86_64",
"product_id": "ovn22.12-central-0:22.12.1-94.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central@22.12.1-94.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-0:22.12.1-94.el9fdp.x86_64",
"product": {
"name": "ovn22.12-host-0:22.12.1-94.el9fdp.x86_64",
"product_id": "ovn22.12-host-0:22.12.1-94.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host@22.12.1-94.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.x86_64",
"product": {
"name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.x86_64",
"product_id": "ovn22.12-vtep-0:22.12.1-94.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep@22.12.1-94.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.x86_64",
"product": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.x86_64",
"product_id": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debugsource@22.12.1-94.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"product": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"product_id": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central-debuginfo@22.12.1-94.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"product": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"product_id": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debuginfo@22.12.1-94.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"product": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"product_id": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host-debuginfo@22.12.1-94.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"product": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"product_id": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep-debuginfo@22.12.1-94.el9fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.12-0:22.12.1-94.el9fdp.ppc64le",
"product": {
"name": "ovn22.12-0:22.12.1-94.el9fdp.ppc64le",
"product_id": "ovn22.12-0:22.12.1-94.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-0:22.12.1-94.el9fdp.ppc64le",
"product": {
"name": "ovn22.12-central-0:22.12.1-94.el9fdp.ppc64le",
"product_id": "ovn22.12-central-0:22.12.1-94.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central@22.12.1-94.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-0:22.12.1-94.el9fdp.ppc64le",
"product": {
"name": "ovn22.12-host-0:22.12.1-94.el9fdp.ppc64le",
"product_id": "ovn22.12-host-0:22.12.1-94.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host@22.12.1-94.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.ppc64le",
"product": {
"name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.ppc64le",
"product_id": "ovn22.12-vtep-0:22.12.1-94.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep@22.12.1-94.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.ppc64le",
"product": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.ppc64le",
"product_id": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debugsource@22.12.1-94.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"product": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"product_id": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central-debuginfo@22.12.1-94.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"product": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"product_id": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debuginfo@22.12.1-94.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"product": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"product_id": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host-debuginfo@22.12.1-94.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"product": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"product_id": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep-debuginfo@22.12.1-94.el9fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.12-0:22.12.1-94.el9fdp.aarch64",
"product": {
"name": "ovn22.12-0:22.12.1-94.el9fdp.aarch64",
"product_id": "ovn22.12-0:22.12.1-94.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-0:22.12.1-94.el9fdp.aarch64",
"product": {
"name": "ovn22.12-central-0:22.12.1-94.el9fdp.aarch64",
"product_id": "ovn22.12-central-0:22.12.1-94.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central@22.12.1-94.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-0:22.12.1-94.el9fdp.aarch64",
"product": {
"name": "ovn22.12-host-0:22.12.1-94.el9fdp.aarch64",
"product_id": "ovn22.12-host-0:22.12.1-94.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host@22.12.1-94.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.aarch64",
"product": {
"name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.aarch64",
"product_id": "ovn22.12-vtep-0:22.12.1-94.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep@22.12.1-94.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.aarch64",
"product": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.aarch64",
"product_id": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debugsource@22.12.1-94.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"product": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"product_id": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central-debuginfo@22.12.1-94.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"product": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"product_id": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debuginfo@22.12.1-94.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"product": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"product_id": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host-debuginfo@22.12.1-94.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"product": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"product_id": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep-debuginfo@22.12.1-94.el9fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.12-0:22.12.1-94.el9fdp.s390x",
"product": {
"name": "ovn22.12-0:22.12.1-94.el9fdp.s390x",
"product_id": "ovn22.12-0:22.12.1-94.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-0:22.12.1-94.el9fdp.s390x",
"product": {
"name": "ovn22.12-central-0:22.12.1-94.el9fdp.s390x",
"product_id": "ovn22.12-central-0:22.12.1-94.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central@22.12.1-94.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-0:22.12.1-94.el9fdp.s390x",
"product": {
"name": "ovn22.12-host-0:22.12.1-94.el9fdp.s390x",
"product_id": "ovn22.12-host-0:22.12.1-94.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host@22.12.1-94.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.s390x",
"product": {
"name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.s390x",
"product_id": "ovn22.12-vtep-0:22.12.1-94.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep@22.12.1-94.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.s390x",
"product": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.s390x",
"product_id": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debugsource@22.12.1-94.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.s390x",
"product": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.s390x",
"product_id": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central-debuginfo@22.12.1-94.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.s390x",
"product": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.s390x",
"product_id": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debuginfo@22.12.1-94.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.s390x",
"product": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.s390x",
"product_id": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host-debuginfo@22.12.1-94.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.s390x",
"product": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.s390x",
"product_id": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep-debuginfo@22.12.1-94.el9fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-0:22.12.1-94.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.aarch64"
},
"product_reference": "ovn22.12-0:22.12.1-94.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-0:22.12.1-94.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.ppc64le"
},
"product_reference": "ovn22.12-0:22.12.1-94.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-0:22.12.1-94.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.s390x"
},
"product_reference": "ovn22.12-0:22.12.1-94.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-0:22.12.1-94.el9fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.src"
},
"product_reference": "ovn22.12-0:22.12.1-94.el9fdp.src",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-0:22.12.1-94.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.x86_64"
},
"product_reference": "ovn22.12-0:22.12.1-94.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-0:22.12.1-94.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.aarch64"
},
"product_reference": "ovn22.12-central-0:22.12.1-94.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-0:22.12.1-94.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.ppc64le"
},
"product_reference": "ovn22.12-central-0:22.12.1-94.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-0:22.12.1-94.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.s390x"
},
"product_reference": "ovn22.12-central-0:22.12.1-94.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-0:22.12.1-94.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.x86_64"
},
"product_reference": "ovn22.12-central-0:22.12.1-94.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.aarch64"
},
"product_reference": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.ppc64le"
},
"product_reference": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.s390x"
},
"product_reference": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.x86_64"
},
"product_reference": "ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.aarch64"
},
"product_reference": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.ppc64le"
},
"product_reference": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.s390x"
},
"product_reference": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.x86_64"
},
"product_reference": "ovn22.12-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.aarch64"
},
"product_reference": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.ppc64le"
},
"product_reference": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.s390x"
},
"product_reference": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.x86_64"
},
"product_reference": "ovn22.12-debugsource-0:22.12.1-94.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-0:22.12.1-94.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.aarch64"
},
"product_reference": "ovn22.12-host-0:22.12.1-94.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-0:22.12.1-94.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.ppc64le"
},
"product_reference": "ovn22.12-host-0:22.12.1-94.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-0:22.12.1-94.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.s390x"
},
"product_reference": "ovn22.12-host-0:22.12.1-94.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-0:22.12.1-94.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.x86_64"
},
"product_reference": "ovn22.12-host-0:22.12.1-94.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.aarch64"
},
"product_reference": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.ppc64le"
},
"product_reference": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.s390x"
},
"product_reference": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.x86_64"
},
"product_reference": "ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.aarch64"
},
"product_reference": "ovn22.12-vtep-0:22.12.1-94.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.ppc64le"
},
"product_reference": "ovn22.12-vtep-0:22.12.1-94.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.s390x"
},
"product_reference": "ovn22.12-vtep-0:22.12.1-94.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-0:22.12.1-94.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.x86_64"
},
"product_reference": "ovn22.12-vtep-0:22.12.1-94.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.aarch64"
},
"product_reference": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.ppc64le"
},
"product_reference": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.s390x"
},
"product_reference": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.x86_64"
},
"product_reference": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Frode Nordahl"
],
"organization": "Canonical"
}
],
"cve": "CVE-2024-2182",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2024-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: insufficient validation of BFD packets may lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.src",
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"category": "external",
"summary": "RHBZ#2267840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2182"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182"
},
{
"category": "external",
"summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html",
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5",
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
}
],
"release_date": "2024-03-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:46:20+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.src",
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1392"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.src",
"9Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.s390x",
"9Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el9fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ovn: insufficient validation of BFD packets may lead to denial of service"
}
]
}
RHSA-2024_1386
Vulnerability from csaf_redhat - Published: 2024-03-19 15:40 - Updated: 2024-11-15 16:11Summary
Red Hat Security Advisory: ovn22.12 security update
Notes
Topic
An update for ovn22.12 is now available in Fast Datapath for Red Hat
Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn22.12: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ovn22.12 is now available in Fast Datapath for Red Hat\nEnterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn22.12: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1386",
"url": "https://access.redhat.com/errata/RHSA-2024:1386"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1386.json"
}
],
"title": "Red Hat Security Advisory: ovn22.12 security update",
"tracking": {
"current_release_date": "2024-11-15T16:11:02+00:00",
"generator": {
"date": "2024-11-15T16:11:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:1386",
"initial_release_date": "2024-03-19T15:40:13+00:00",
"revision_history": [
{
"date": "2024-03-19T15:40:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-03-19T15:40:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T16:11:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fast Datapath for Red Hat Enterprise Linux 8",
"product": {
"name": "Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::fastdatapath"
}
}
}
],
"category": "product_family",
"name": "Fast Datapath"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.12-0:22.12.1-94.el8fdp.src",
"product": {
"name": "ovn22.12-0:22.12.1-94.el8fdp.src",
"product_id": "ovn22.12-0:22.12.1-94.el8fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el8fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.12-0:22.12.1-94.el8fdp.x86_64",
"product": {
"name": "ovn22.12-0:22.12.1-94.el8fdp.x86_64",
"product_id": "ovn22.12-0:22.12.1-94.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-0:22.12.1-94.el8fdp.x86_64",
"product": {
"name": "ovn22.12-central-0:22.12.1-94.el8fdp.x86_64",
"product_id": "ovn22.12-central-0:22.12.1-94.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central@22.12.1-94.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-0:22.12.1-94.el8fdp.x86_64",
"product": {
"name": "ovn22.12-host-0:22.12.1-94.el8fdp.x86_64",
"product_id": "ovn22.12-host-0:22.12.1-94.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host@22.12.1-94.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.x86_64",
"product": {
"name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.x86_64",
"product_id": "ovn22.12-vtep-0:22.12.1-94.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep@22.12.1-94.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.x86_64",
"product": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.x86_64",
"product_id": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debugsource@22.12.1-94.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"product": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"product_id": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central-debuginfo@22.12.1-94.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"product": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"product_id": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debuginfo@22.12.1-94.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"product": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"product_id": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host-debuginfo@22.12.1-94.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"product": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"product_id": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep-debuginfo@22.12.1-94.el8fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.12-0:22.12.1-94.el8fdp.ppc64le",
"product": {
"name": "ovn22.12-0:22.12.1-94.el8fdp.ppc64le",
"product_id": "ovn22.12-0:22.12.1-94.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-0:22.12.1-94.el8fdp.ppc64le",
"product": {
"name": "ovn22.12-central-0:22.12.1-94.el8fdp.ppc64le",
"product_id": "ovn22.12-central-0:22.12.1-94.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central@22.12.1-94.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-0:22.12.1-94.el8fdp.ppc64le",
"product": {
"name": "ovn22.12-host-0:22.12.1-94.el8fdp.ppc64le",
"product_id": "ovn22.12-host-0:22.12.1-94.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host@22.12.1-94.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.ppc64le",
"product": {
"name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.ppc64le",
"product_id": "ovn22.12-vtep-0:22.12.1-94.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep@22.12.1-94.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.ppc64le",
"product": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.ppc64le",
"product_id": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debugsource@22.12.1-94.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"product": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"product_id": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central-debuginfo@22.12.1-94.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"product": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"product_id": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debuginfo@22.12.1-94.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"product": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"product_id": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host-debuginfo@22.12.1-94.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"product": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"product_id": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep-debuginfo@22.12.1-94.el8fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.12-0:22.12.1-94.el8fdp.aarch64",
"product": {
"name": "ovn22.12-0:22.12.1-94.el8fdp.aarch64",
"product_id": "ovn22.12-0:22.12.1-94.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-0:22.12.1-94.el8fdp.aarch64",
"product": {
"name": "ovn22.12-central-0:22.12.1-94.el8fdp.aarch64",
"product_id": "ovn22.12-central-0:22.12.1-94.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central@22.12.1-94.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-0:22.12.1-94.el8fdp.aarch64",
"product": {
"name": "ovn22.12-host-0:22.12.1-94.el8fdp.aarch64",
"product_id": "ovn22.12-host-0:22.12.1-94.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host@22.12.1-94.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.aarch64",
"product": {
"name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.aarch64",
"product_id": "ovn22.12-vtep-0:22.12.1-94.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep@22.12.1-94.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.aarch64",
"product": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.aarch64",
"product_id": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debugsource@22.12.1-94.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"product": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"product_id": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central-debuginfo@22.12.1-94.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"product": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"product_id": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debuginfo@22.12.1-94.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"product": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"product_id": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host-debuginfo@22.12.1-94.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"product": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"product_id": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep-debuginfo@22.12.1-94.el8fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.12-0:22.12.1-94.el8fdp.s390x",
"product": {
"name": "ovn22.12-0:22.12.1-94.el8fdp.s390x",
"product_id": "ovn22.12-0:22.12.1-94.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12@22.12.1-94.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-0:22.12.1-94.el8fdp.s390x",
"product": {
"name": "ovn22.12-central-0:22.12.1-94.el8fdp.s390x",
"product_id": "ovn22.12-central-0:22.12.1-94.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central@22.12.1-94.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-0:22.12.1-94.el8fdp.s390x",
"product": {
"name": "ovn22.12-host-0:22.12.1-94.el8fdp.s390x",
"product_id": "ovn22.12-host-0:22.12.1-94.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host@22.12.1-94.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.s390x",
"product": {
"name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.s390x",
"product_id": "ovn22.12-vtep-0:22.12.1-94.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep@22.12.1-94.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.s390x",
"product": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.s390x",
"product_id": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debugsource@22.12.1-94.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.s390x",
"product": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.s390x",
"product_id": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-central-debuginfo@22.12.1-94.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.s390x",
"product": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.s390x",
"product_id": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-debuginfo@22.12.1-94.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.s390x",
"product": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.s390x",
"product_id": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-host-debuginfo@22.12.1-94.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.s390x",
"product": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.s390x",
"product_id": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.12-vtep-debuginfo@22.12.1-94.el8fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-0:22.12.1-94.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.aarch64"
},
"product_reference": "ovn22.12-0:22.12.1-94.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-0:22.12.1-94.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.ppc64le"
},
"product_reference": "ovn22.12-0:22.12.1-94.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-0:22.12.1-94.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.s390x"
},
"product_reference": "ovn22.12-0:22.12.1-94.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-0:22.12.1-94.el8fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.src"
},
"product_reference": "ovn22.12-0:22.12.1-94.el8fdp.src",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-0:22.12.1-94.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.x86_64"
},
"product_reference": "ovn22.12-0:22.12.1-94.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-0:22.12.1-94.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.aarch64"
},
"product_reference": "ovn22.12-central-0:22.12.1-94.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-0:22.12.1-94.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.ppc64le"
},
"product_reference": "ovn22.12-central-0:22.12.1-94.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-0:22.12.1-94.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.s390x"
},
"product_reference": "ovn22.12-central-0:22.12.1-94.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-0:22.12.1-94.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.x86_64"
},
"product_reference": "ovn22.12-central-0:22.12.1-94.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.aarch64"
},
"product_reference": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.ppc64le"
},
"product_reference": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.s390x"
},
"product_reference": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.x86_64"
},
"product_reference": "ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.aarch64"
},
"product_reference": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.ppc64le"
},
"product_reference": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.s390x"
},
"product_reference": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.x86_64"
},
"product_reference": "ovn22.12-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.aarch64"
},
"product_reference": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.ppc64le"
},
"product_reference": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.s390x"
},
"product_reference": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.x86_64"
},
"product_reference": "ovn22.12-debugsource-0:22.12.1-94.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-0:22.12.1-94.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.aarch64"
},
"product_reference": "ovn22.12-host-0:22.12.1-94.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-0:22.12.1-94.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.ppc64le"
},
"product_reference": "ovn22.12-host-0:22.12.1-94.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-0:22.12.1-94.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.s390x"
},
"product_reference": "ovn22.12-host-0:22.12.1-94.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-0:22.12.1-94.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.x86_64"
},
"product_reference": "ovn22.12-host-0:22.12.1-94.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.aarch64"
},
"product_reference": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.ppc64le"
},
"product_reference": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.s390x"
},
"product_reference": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.x86_64"
},
"product_reference": "ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.aarch64"
},
"product_reference": "ovn22.12-vtep-0:22.12.1-94.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.ppc64le"
},
"product_reference": "ovn22.12-vtep-0:22.12.1-94.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.s390x"
},
"product_reference": "ovn22.12-vtep-0:22.12.1-94.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-0:22.12.1-94.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.x86_64"
},
"product_reference": "ovn22.12-vtep-0:22.12.1-94.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.aarch64"
},
"product_reference": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.ppc64le"
},
"product_reference": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.s390x"
},
"product_reference": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.x86_64"
},
"product_reference": "ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Frode Nordahl"
],
"organization": "Canonical"
}
],
"cve": "CVE-2024-2182",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2024-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: insufficient validation of BFD packets may lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.src",
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"category": "external",
"summary": "RHBZ#2267840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2182"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182"
},
{
"category": "external",
"summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html",
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5",
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
}
],
"release_date": "2024-03-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:40:13+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.src",
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1386"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.src",
"8Base-Fast-Datapath:ovn22.12-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-central-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-central-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-debugsource-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-host-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-host-debuginfo-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-vtep-0:22.12.1-94.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.12-vtep-debuginfo-0:22.12.1-94.el8fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ovn: insufficient validation of BFD packets may lead to denial of service"
}
]
}
RHSA-2024:1388
Vulnerability from csaf_redhat - Published: 2024-03-19 15:42 - Updated: 2025-11-21 18:57Summary
Red Hat Security Advisory: ovn23.03 security update
Notes
Topic
An update for ovn23.03 is now available in Fast Datapath for Red Hat
Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn23.03: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ovn23.03 is now available in Fast Datapath for Red Hat\nEnterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn23.03: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1388",
"url": "https://access.redhat.com/errata/RHSA-2024:1388"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1388.json"
}
],
"title": "Red Hat Security Advisory: ovn23.03 security update",
"tracking": {
"current_release_date": "2025-11-21T18:57:26+00:00",
"generator": {
"date": "2025-11-21T18:57:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:1388",
"initial_release_date": "2024-03-19T15:42:17+00:00",
"revision_history": [
{
"date": "2024-03-19T15:42:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-03-19T15:42:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:57:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fast Datapath for Red Hat Enterprise Linux 8",
"product": {
"name": "Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::fastdatapath"
}
}
}
],
"category": "product_family",
"name": "Fast Datapath"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.03-0:23.03.1-100.el8fdp.src",
"product": {
"name": "ovn23.03-0:23.03.1-100.el8fdp.src",
"product_id": "ovn23.03-0:23.03.1-100.el8fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el8fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.03-0:23.03.1-100.el8fdp.x86_64",
"product": {
"name": "ovn23.03-0:23.03.1-100.el8fdp.x86_64",
"product_id": "ovn23.03-0:23.03.1-100.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-0:23.03.1-100.el8fdp.x86_64",
"product": {
"name": "ovn23.03-central-0:23.03.1-100.el8fdp.x86_64",
"product_id": "ovn23.03-central-0:23.03.1-100.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central@23.03.1-100.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-0:23.03.1-100.el8fdp.x86_64",
"product": {
"name": "ovn23.03-host-0:23.03.1-100.el8fdp.x86_64",
"product_id": "ovn23.03-host-0:23.03.1-100.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host@23.03.1-100.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.x86_64",
"product": {
"name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.x86_64",
"product_id": "ovn23.03-vtep-0:23.03.1-100.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep@23.03.1-100.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.x86_64",
"product": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.x86_64",
"product_id": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debugsource@23.03.1-100.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"product": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"product_id": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central-debuginfo@23.03.1-100.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"product": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"product_id": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debuginfo@23.03.1-100.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"product": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"product_id": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host-debuginfo@23.03.1-100.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"product": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"product_id": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep-debuginfo@23.03.1-100.el8fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.03-0:23.03.1-100.el8fdp.ppc64le",
"product": {
"name": "ovn23.03-0:23.03.1-100.el8fdp.ppc64le",
"product_id": "ovn23.03-0:23.03.1-100.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-0:23.03.1-100.el8fdp.ppc64le",
"product": {
"name": "ovn23.03-central-0:23.03.1-100.el8fdp.ppc64le",
"product_id": "ovn23.03-central-0:23.03.1-100.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central@23.03.1-100.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-0:23.03.1-100.el8fdp.ppc64le",
"product": {
"name": "ovn23.03-host-0:23.03.1-100.el8fdp.ppc64le",
"product_id": "ovn23.03-host-0:23.03.1-100.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host@23.03.1-100.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.ppc64le",
"product": {
"name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.ppc64le",
"product_id": "ovn23.03-vtep-0:23.03.1-100.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep@23.03.1-100.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.ppc64le",
"product": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.ppc64le",
"product_id": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debugsource@23.03.1-100.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"product": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"product_id": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central-debuginfo@23.03.1-100.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"product": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"product_id": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debuginfo@23.03.1-100.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"product": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"product_id": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host-debuginfo@23.03.1-100.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"product": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"product_id": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep-debuginfo@23.03.1-100.el8fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.03-0:23.03.1-100.el8fdp.aarch64",
"product": {
"name": "ovn23.03-0:23.03.1-100.el8fdp.aarch64",
"product_id": "ovn23.03-0:23.03.1-100.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-0:23.03.1-100.el8fdp.aarch64",
"product": {
"name": "ovn23.03-central-0:23.03.1-100.el8fdp.aarch64",
"product_id": "ovn23.03-central-0:23.03.1-100.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central@23.03.1-100.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-0:23.03.1-100.el8fdp.aarch64",
"product": {
"name": "ovn23.03-host-0:23.03.1-100.el8fdp.aarch64",
"product_id": "ovn23.03-host-0:23.03.1-100.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host@23.03.1-100.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.aarch64",
"product": {
"name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.aarch64",
"product_id": "ovn23.03-vtep-0:23.03.1-100.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep@23.03.1-100.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.aarch64",
"product": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.aarch64",
"product_id": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debugsource@23.03.1-100.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"product": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"product_id": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central-debuginfo@23.03.1-100.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"product": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"product_id": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debuginfo@23.03.1-100.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"product": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"product_id": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host-debuginfo@23.03.1-100.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"product": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"product_id": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep-debuginfo@23.03.1-100.el8fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.03-0:23.03.1-100.el8fdp.s390x",
"product": {
"name": "ovn23.03-0:23.03.1-100.el8fdp.s390x",
"product_id": "ovn23.03-0:23.03.1-100.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-0:23.03.1-100.el8fdp.s390x",
"product": {
"name": "ovn23.03-central-0:23.03.1-100.el8fdp.s390x",
"product_id": "ovn23.03-central-0:23.03.1-100.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central@23.03.1-100.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-0:23.03.1-100.el8fdp.s390x",
"product": {
"name": "ovn23.03-host-0:23.03.1-100.el8fdp.s390x",
"product_id": "ovn23.03-host-0:23.03.1-100.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host@23.03.1-100.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.s390x",
"product": {
"name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.s390x",
"product_id": "ovn23.03-vtep-0:23.03.1-100.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep@23.03.1-100.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.s390x",
"product": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.s390x",
"product_id": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debugsource@23.03.1-100.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.s390x",
"product": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.s390x",
"product_id": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central-debuginfo@23.03.1-100.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.s390x",
"product": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.s390x",
"product_id": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debuginfo@23.03.1-100.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.s390x",
"product": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.s390x",
"product_id": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host-debuginfo@23.03.1-100.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.s390x",
"product": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.s390x",
"product_id": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep-debuginfo@23.03.1-100.el8fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-0:23.03.1-100.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.aarch64"
},
"product_reference": "ovn23.03-0:23.03.1-100.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-0:23.03.1-100.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.ppc64le"
},
"product_reference": "ovn23.03-0:23.03.1-100.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-0:23.03.1-100.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.s390x"
},
"product_reference": "ovn23.03-0:23.03.1-100.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-0:23.03.1-100.el8fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.src"
},
"product_reference": "ovn23.03-0:23.03.1-100.el8fdp.src",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-0:23.03.1-100.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.x86_64"
},
"product_reference": "ovn23.03-0:23.03.1-100.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-0:23.03.1-100.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.aarch64"
},
"product_reference": "ovn23.03-central-0:23.03.1-100.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-0:23.03.1-100.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.ppc64le"
},
"product_reference": "ovn23.03-central-0:23.03.1-100.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-0:23.03.1-100.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.s390x"
},
"product_reference": "ovn23.03-central-0:23.03.1-100.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-0:23.03.1-100.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.x86_64"
},
"product_reference": "ovn23.03-central-0:23.03.1-100.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.aarch64"
},
"product_reference": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.ppc64le"
},
"product_reference": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.s390x"
},
"product_reference": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.x86_64"
},
"product_reference": "ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.aarch64"
},
"product_reference": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.ppc64le"
},
"product_reference": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.s390x"
},
"product_reference": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.x86_64"
},
"product_reference": "ovn23.03-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.aarch64"
},
"product_reference": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.ppc64le"
},
"product_reference": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.s390x"
},
"product_reference": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.x86_64"
},
"product_reference": "ovn23.03-debugsource-0:23.03.1-100.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-0:23.03.1-100.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.aarch64"
},
"product_reference": "ovn23.03-host-0:23.03.1-100.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-0:23.03.1-100.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.ppc64le"
},
"product_reference": "ovn23.03-host-0:23.03.1-100.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-0:23.03.1-100.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.s390x"
},
"product_reference": "ovn23.03-host-0:23.03.1-100.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-0:23.03.1-100.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.x86_64"
},
"product_reference": "ovn23.03-host-0:23.03.1-100.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.aarch64"
},
"product_reference": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.ppc64le"
},
"product_reference": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.s390x"
},
"product_reference": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.x86_64"
},
"product_reference": "ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.aarch64"
},
"product_reference": "ovn23.03-vtep-0:23.03.1-100.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.ppc64le"
},
"product_reference": "ovn23.03-vtep-0:23.03.1-100.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.s390x"
},
"product_reference": "ovn23.03-vtep-0:23.03.1-100.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-0:23.03.1-100.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.x86_64"
},
"product_reference": "ovn23.03-vtep-0:23.03.1-100.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.aarch64"
},
"product_reference": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.ppc64le"
},
"product_reference": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.s390x"
},
"product_reference": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.x86_64"
},
"product_reference": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Frode Nordahl"
],
"organization": "Canonical"
}
],
"cve": "CVE-2024-2182",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2024-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: insufficient validation of BFD packets may lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.src",
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"category": "external",
"summary": "RHBZ#2267840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2182"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182"
},
{
"category": "external",
"summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html",
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5",
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
}
],
"release_date": "2024-03-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:42:17+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.src",
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1388"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.src",
"8Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el8fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ovn: insufficient validation of BFD packets may lead to denial of service"
}
]
}
RHSA-2024_1394
Vulnerability from csaf_redhat - Published: 2024-03-19 15:46 - Updated: 2024-11-15 16:10Summary
Red Hat Security Advisory: ovn23.03 security update
Notes
Topic
An update for ovn23.03 is now available in Fast Datapath for Red Hat
Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn23.03: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ovn23.03 is now available in Fast Datapath for Red Hat\nEnterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn23.03: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1394",
"url": "https://access.redhat.com/errata/RHSA-2024:1394"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1394.json"
}
],
"title": "Red Hat Security Advisory: ovn23.03 security update",
"tracking": {
"current_release_date": "2024-11-15T16:10:38+00:00",
"generator": {
"date": "2024-11-15T16:10:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:1394",
"initial_release_date": "2024-03-19T15:46:57+00:00",
"revision_history": [
{
"date": "2024-03-19T15:46:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-03-19T15:46:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T16:10:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product": {
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::fastdatapath"
}
}
}
],
"category": "product_family",
"name": "Fast Datapath"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.03-0:23.03.1-100.el9fdp.src",
"product": {
"name": "ovn23.03-0:23.03.1-100.el9fdp.src",
"product_id": "ovn23.03-0:23.03.1-100.el9fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el9fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.03-0:23.03.1-100.el9fdp.x86_64",
"product": {
"name": "ovn23.03-0:23.03.1-100.el9fdp.x86_64",
"product_id": "ovn23.03-0:23.03.1-100.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-0:23.03.1-100.el9fdp.x86_64",
"product": {
"name": "ovn23.03-central-0:23.03.1-100.el9fdp.x86_64",
"product_id": "ovn23.03-central-0:23.03.1-100.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central@23.03.1-100.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-0:23.03.1-100.el9fdp.x86_64",
"product": {
"name": "ovn23.03-host-0:23.03.1-100.el9fdp.x86_64",
"product_id": "ovn23.03-host-0:23.03.1-100.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host@23.03.1-100.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.x86_64",
"product": {
"name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.x86_64",
"product_id": "ovn23.03-vtep-0:23.03.1-100.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep@23.03.1-100.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.x86_64",
"product": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.x86_64",
"product_id": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debugsource@23.03.1-100.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"product": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"product_id": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central-debuginfo@23.03.1-100.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"product": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"product_id": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debuginfo@23.03.1-100.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"product": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"product_id": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host-debuginfo@23.03.1-100.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"product": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"product_id": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep-debuginfo@23.03.1-100.el9fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.03-0:23.03.1-100.el9fdp.ppc64le",
"product": {
"name": "ovn23.03-0:23.03.1-100.el9fdp.ppc64le",
"product_id": "ovn23.03-0:23.03.1-100.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-0:23.03.1-100.el9fdp.ppc64le",
"product": {
"name": "ovn23.03-central-0:23.03.1-100.el9fdp.ppc64le",
"product_id": "ovn23.03-central-0:23.03.1-100.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central@23.03.1-100.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-0:23.03.1-100.el9fdp.ppc64le",
"product": {
"name": "ovn23.03-host-0:23.03.1-100.el9fdp.ppc64le",
"product_id": "ovn23.03-host-0:23.03.1-100.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host@23.03.1-100.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.ppc64le",
"product": {
"name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.ppc64le",
"product_id": "ovn23.03-vtep-0:23.03.1-100.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep@23.03.1-100.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.ppc64le",
"product": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.ppc64le",
"product_id": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debugsource@23.03.1-100.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"product": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"product_id": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central-debuginfo@23.03.1-100.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"product": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"product_id": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debuginfo@23.03.1-100.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"product": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"product_id": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host-debuginfo@23.03.1-100.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"product": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"product_id": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep-debuginfo@23.03.1-100.el9fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.03-0:23.03.1-100.el9fdp.aarch64",
"product": {
"name": "ovn23.03-0:23.03.1-100.el9fdp.aarch64",
"product_id": "ovn23.03-0:23.03.1-100.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-0:23.03.1-100.el9fdp.aarch64",
"product": {
"name": "ovn23.03-central-0:23.03.1-100.el9fdp.aarch64",
"product_id": "ovn23.03-central-0:23.03.1-100.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central@23.03.1-100.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-0:23.03.1-100.el9fdp.aarch64",
"product": {
"name": "ovn23.03-host-0:23.03.1-100.el9fdp.aarch64",
"product_id": "ovn23.03-host-0:23.03.1-100.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host@23.03.1-100.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.aarch64",
"product": {
"name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.aarch64",
"product_id": "ovn23.03-vtep-0:23.03.1-100.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep@23.03.1-100.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.aarch64",
"product": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.aarch64",
"product_id": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debugsource@23.03.1-100.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"product": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"product_id": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central-debuginfo@23.03.1-100.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"product": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"product_id": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debuginfo@23.03.1-100.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"product": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"product_id": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host-debuginfo@23.03.1-100.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"product": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"product_id": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep-debuginfo@23.03.1-100.el9fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.03-0:23.03.1-100.el9fdp.s390x",
"product": {
"name": "ovn23.03-0:23.03.1-100.el9fdp.s390x",
"product_id": "ovn23.03-0:23.03.1-100.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03@23.03.1-100.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-0:23.03.1-100.el9fdp.s390x",
"product": {
"name": "ovn23.03-central-0:23.03.1-100.el9fdp.s390x",
"product_id": "ovn23.03-central-0:23.03.1-100.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central@23.03.1-100.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-0:23.03.1-100.el9fdp.s390x",
"product": {
"name": "ovn23.03-host-0:23.03.1-100.el9fdp.s390x",
"product_id": "ovn23.03-host-0:23.03.1-100.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host@23.03.1-100.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.s390x",
"product": {
"name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.s390x",
"product_id": "ovn23.03-vtep-0:23.03.1-100.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep@23.03.1-100.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.s390x",
"product": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.s390x",
"product_id": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debugsource@23.03.1-100.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.s390x",
"product": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.s390x",
"product_id": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-central-debuginfo@23.03.1-100.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.s390x",
"product": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.s390x",
"product_id": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-debuginfo@23.03.1-100.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.s390x",
"product": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.s390x",
"product_id": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-host-debuginfo@23.03.1-100.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.s390x",
"product": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.s390x",
"product_id": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.03-vtep-debuginfo@23.03.1-100.el9fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-0:23.03.1-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.aarch64"
},
"product_reference": "ovn23.03-0:23.03.1-100.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-0:23.03.1-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.ppc64le"
},
"product_reference": "ovn23.03-0:23.03.1-100.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-0:23.03.1-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.s390x"
},
"product_reference": "ovn23.03-0:23.03.1-100.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-0:23.03.1-100.el9fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.src"
},
"product_reference": "ovn23.03-0:23.03.1-100.el9fdp.src",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-0:23.03.1-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.x86_64"
},
"product_reference": "ovn23.03-0:23.03.1-100.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-0:23.03.1-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.aarch64"
},
"product_reference": "ovn23.03-central-0:23.03.1-100.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-0:23.03.1-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.ppc64le"
},
"product_reference": "ovn23.03-central-0:23.03.1-100.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-0:23.03.1-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.s390x"
},
"product_reference": "ovn23.03-central-0:23.03.1-100.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-0:23.03.1-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.x86_64"
},
"product_reference": "ovn23.03-central-0:23.03.1-100.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.aarch64"
},
"product_reference": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.ppc64le"
},
"product_reference": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.s390x"
},
"product_reference": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.x86_64"
},
"product_reference": "ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.aarch64"
},
"product_reference": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.ppc64le"
},
"product_reference": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.s390x"
},
"product_reference": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.x86_64"
},
"product_reference": "ovn23.03-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.aarch64"
},
"product_reference": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.ppc64le"
},
"product_reference": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.s390x"
},
"product_reference": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.x86_64"
},
"product_reference": "ovn23.03-debugsource-0:23.03.1-100.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-0:23.03.1-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.aarch64"
},
"product_reference": "ovn23.03-host-0:23.03.1-100.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-0:23.03.1-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.ppc64le"
},
"product_reference": "ovn23.03-host-0:23.03.1-100.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-0:23.03.1-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.s390x"
},
"product_reference": "ovn23.03-host-0:23.03.1-100.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-0:23.03.1-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.x86_64"
},
"product_reference": "ovn23.03-host-0:23.03.1-100.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.aarch64"
},
"product_reference": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.ppc64le"
},
"product_reference": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.s390x"
},
"product_reference": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.x86_64"
},
"product_reference": "ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.aarch64"
},
"product_reference": "ovn23.03-vtep-0:23.03.1-100.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.ppc64le"
},
"product_reference": "ovn23.03-vtep-0:23.03.1-100.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.s390x"
},
"product_reference": "ovn23.03-vtep-0:23.03.1-100.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-0:23.03.1-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.x86_64"
},
"product_reference": "ovn23.03-vtep-0:23.03.1-100.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.aarch64"
},
"product_reference": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.ppc64le"
},
"product_reference": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.s390x"
},
"product_reference": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.x86_64"
},
"product_reference": "ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Frode Nordahl"
],
"organization": "Canonical"
}
],
"cve": "CVE-2024-2182",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2024-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: insufficient validation of BFD packets may lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.src",
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"category": "external",
"summary": "RHBZ#2267840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2182"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182"
},
{
"category": "external",
"summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html",
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5",
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
}
],
"release_date": "2024-03-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:46:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.src",
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1394"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.src",
"9Base-Fast-Datapath:ovn23.03-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-central-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-central-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-debugsource-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-host-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-host-debuginfo-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-vtep-0:23.03.1-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.03-vtep-debuginfo-0:23.03.1-100.el9fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ovn: insufficient validation of BFD packets may lead to denial of service"
}
]
}
RHSA-2024_1390
Vulnerability from csaf_redhat - Published: 2024-03-19 15:46 - Updated: 2024-11-15 16:10Summary
Red Hat Security Advisory: ovn23.09 security update
Notes
Topic
An update for ovn23.09 is now available in Fast Datapath for Red Hat
Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn23.09: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ovn23.09 is now available in Fast Datapath for Red Hat\nEnterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn23.09: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1390",
"url": "https://access.redhat.com/errata/RHSA-2024:1390"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1390.json"
}
],
"title": "Red Hat Security Advisory: ovn23.09 security update",
"tracking": {
"current_release_date": "2024-11-15T16:10:52+00:00",
"generator": {
"date": "2024-11-15T16:10:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:1390",
"initial_release_date": "2024-03-19T15:46:14+00:00",
"revision_history": [
{
"date": "2024-03-19T15:46:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-03-19T15:46:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T16:10:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product": {
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::fastdatapath"
}
}
}
],
"category": "product_family",
"name": "Fast Datapath"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.09-0:23.09.0-136.el9fdp.src",
"product": {
"name": "ovn23.09-0:23.09.0-136.el9fdp.src",
"product_id": "ovn23.09-0:23.09.0-136.el9fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09@23.09.0-136.el9fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.09-0:23.09.0-136.el9fdp.x86_64",
"product": {
"name": "ovn23.09-0:23.09.0-136.el9fdp.x86_64",
"product_id": "ovn23.09-0:23.09.0-136.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09@23.09.0-136.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-central-0:23.09.0-136.el9fdp.x86_64",
"product": {
"name": "ovn23.09-central-0:23.09.0-136.el9fdp.x86_64",
"product_id": "ovn23.09-central-0:23.09.0-136.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-central@23.09.0-136.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-host-0:23.09.0-136.el9fdp.x86_64",
"product": {
"name": "ovn23.09-host-0:23.09.0-136.el9fdp.x86_64",
"product_id": "ovn23.09-host-0:23.09.0-136.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-host@23.09.0-136.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.x86_64",
"product": {
"name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.x86_64",
"product_id": "ovn23.09-vtep-0:23.09.0-136.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-vtep@23.09.0-136.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.x86_64",
"product": {
"name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.x86_64",
"product_id": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-debugsource@23.09.0-136.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"product": {
"name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"product_id": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-central-debuginfo@23.09.0-136.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"product": {
"name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"product_id": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-debuginfo@23.09.0-136.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"product": {
"name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"product_id": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-host-debuginfo@23.09.0-136.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"product": {
"name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"product_id": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-vtep-debuginfo@23.09.0-136.el9fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.09-0:23.09.0-136.el9fdp.ppc64le",
"product": {
"name": "ovn23.09-0:23.09.0-136.el9fdp.ppc64le",
"product_id": "ovn23.09-0:23.09.0-136.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09@23.09.0-136.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-central-0:23.09.0-136.el9fdp.ppc64le",
"product": {
"name": "ovn23.09-central-0:23.09.0-136.el9fdp.ppc64le",
"product_id": "ovn23.09-central-0:23.09.0-136.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-central@23.09.0-136.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-host-0:23.09.0-136.el9fdp.ppc64le",
"product": {
"name": "ovn23.09-host-0:23.09.0-136.el9fdp.ppc64le",
"product_id": "ovn23.09-host-0:23.09.0-136.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-host@23.09.0-136.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.ppc64le",
"product": {
"name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.ppc64le",
"product_id": "ovn23.09-vtep-0:23.09.0-136.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-vtep@23.09.0-136.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.ppc64le",
"product": {
"name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.ppc64le",
"product_id": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-debugsource@23.09.0-136.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"product": {
"name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"product_id": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-central-debuginfo@23.09.0-136.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"product": {
"name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"product_id": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-debuginfo@23.09.0-136.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"product": {
"name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"product_id": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-host-debuginfo@23.09.0-136.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"product": {
"name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"product_id": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-vtep-debuginfo@23.09.0-136.el9fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.09-0:23.09.0-136.el9fdp.aarch64",
"product": {
"name": "ovn23.09-0:23.09.0-136.el9fdp.aarch64",
"product_id": "ovn23.09-0:23.09.0-136.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09@23.09.0-136.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-central-0:23.09.0-136.el9fdp.aarch64",
"product": {
"name": "ovn23.09-central-0:23.09.0-136.el9fdp.aarch64",
"product_id": "ovn23.09-central-0:23.09.0-136.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-central@23.09.0-136.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-host-0:23.09.0-136.el9fdp.aarch64",
"product": {
"name": "ovn23.09-host-0:23.09.0-136.el9fdp.aarch64",
"product_id": "ovn23.09-host-0:23.09.0-136.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-host@23.09.0-136.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.aarch64",
"product": {
"name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.aarch64",
"product_id": "ovn23.09-vtep-0:23.09.0-136.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-vtep@23.09.0-136.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.aarch64",
"product": {
"name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.aarch64",
"product_id": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-debugsource@23.09.0-136.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"product": {
"name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"product_id": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-central-debuginfo@23.09.0-136.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"product": {
"name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"product_id": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-debuginfo@23.09.0-136.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"product": {
"name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"product_id": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-host-debuginfo@23.09.0-136.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"product": {
"name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"product_id": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-vtep-debuginfo@23.09.0-136.el9fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.09-0:23.09.0-136.el9fdp.s390x",
"product": {
"name": "ovn23.09-0:23.09.0-136.el9fdp.s390x",
"product_id": "ovn23.09-0:23.09.0-136.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09@23.09.0-136.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-central-0:23.09.0-136.el9fdp.s390x",
"product": {
"name": "ovn23.09-central-0:23.09.0-136.el9fdp.s390x",
"product_id": "ovn23.09-central-0:23.09.0-136.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-central@23.09.0-136.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-host-0:23.09.0-136.el9fdp.s390x",
"product": {
"name": "ovn23.09-host-0:23.09.0-136.el9fdp.s390x",
"product_id": "ovn23.09-host-0:23.09.0-136.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-host@23.09.0-136.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.s390x",
"product": {
"name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.s390x",
"product_id": "ovn23.09-vtep-0:23.09.0-136.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-vtep@23.09.0-136.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.s390x",
"product": {
"name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.s390x",
"product_id": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-debugsource@23.09.0-136.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.s390x",
"product": {
"name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.s390x",
"product_id": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-central-debuginfo@23.09.0-136.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.s390x",
"product": {
"name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.s390x",
"product_id": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-debuginfo@23.09.0-136.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.s390x",
"product": {
"name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.s390x",
"product_id": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-host-debuginfo@23.09.0-136.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.s390x",
"product": {
"name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.s390x",
"product_id": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-vtep-debuginfo@23.09.0-136.el9fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-0:23.09.0-136.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.aarch64"
},
"product_reference": "ovn23.09-0:23.09.0-136.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-0:23.09.0-136.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.ppc64le"
},
"product_reference": "ovn23.09-0:23.09.0-136.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-0:23.09.0-136.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.s390x"
},
"product_reference": "ovn23.09-0:23.09.0-136.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-0:23.09.0-136.el9fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.src"
},
"product_reference": "ovn23.09-0:23.09.0-136.el9fdp.src",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-0:23.09.0-136.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.x86_64"
},
"product_reference": "ovn23.09-0:23.09.0-136.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-central-0:23.09.0-136.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.aarch64"
},
"product_reference": "ovn23.09-central-0:23.09.0-136.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-central-0:23.09.0-136.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.ppc64le"
},
"product_reference": "ovn23.09-central-0:23.09.0-136.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-central-0:23.09.0-136.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.s390x"
},
"product_reference": "ovn23.09-central-0:23.09.0-136.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-central-0:23.09.0-136.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.x86_64"
},
"product_reference": "ovn23.09-central-0:23.09.0-136.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.aarch64"
},
"product_reference": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.ppc64le"
},
"product_reference": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.s390x"
},
"product_reference": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.x86_64"
},
"product_reference": "ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.aarch64"
},
"product_reference": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.ppc64le"
},
"product_reference": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.s390x"
},
"product_reference": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.x86_64"
},
"product_reference": "ovn23.09-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.aarch64"
},
"product_reference": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.ppc64le"
},
"product_reference": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.s390x"
},
"product_reference": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.x86_64"
},
"product_reference": "ovn23.09-debugsource-0:23.09.0-136.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-host-0:23.09.0-136.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.aarch64"
},
"product_reference": "ovn23.09-host-0:23.09.0-136.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-host-0:23.09.0-136.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.ppc64le"
},
"product_reference": "ovn23.09-host-0:23.09.0-136.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-host-0:23.09.0-136.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.s390x"
},
"product_reference": "ovn23.09-host-0:23.09.0-136.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-host-0:23.09.0-136.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.x86_64"
},
"product_reference": "ovn23.09-host-0:23.09.0-136.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.aarch64"
},
"product_reference": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.ppc64le"
},
"product_reference": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.s390x"
},
"product_reference": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.x86_64"
},
"product_reference": "ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.aarch64"
},
"product_reference": "ovn23.09-vtep-0:23.09.0-136.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.ppc64le"
},
"product_reference": "ovn23.09-vtep-0:23.09.0-136.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.s390x"
},
"product_reference": "ovn23.09-vtep-0:23.09.0-136.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-vtep-0:23.09.0-136.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.x86_64"
},
"product_reference": "ovn23.09-vtep-0:23.09.0-136.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.aarch64"
},
"product_reference": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.ppc64le"
},
"product_reference": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.s390x"
},
"product_reference": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.x86_64"
},
"product_reference": "ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Frode Nordahl"
],
"organization": "Canonical"
}
],
"cve": "CVE-2024-2182",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2024-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: insufficient validation of BFD packets may lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.src",
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"category": "external",
"summary": "RHBZ#2267840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2182"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182"
},
{
"category": "external",
"summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html",
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5",
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
}
],
"release_date": "2024-03-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:46:14+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.src",
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1390"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.src",
"9Base-Fast-Datapath:ovn23.09-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.0-136.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.0-136.el9fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ovn: insufficient validation of BFD packets may lead to denial of service"
}
]
}
RHSA-2024:1387
Vulnerability from csaf_redhat - Published: 2024-03-19 15:39 - Updated: 2025-11-21 18:57Summary
Red Hat Security Advisory: ovn22.03 security update
Notes
Topic
An update for ovn22.03 is now available in Fast Datapath for Red Hat
Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add
native support for virtual network abstractions, such as virtual L2 and L3
overlays and security groups.
Security fix(es):
* ovn22.03: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ovn22.03 is now available in Fast Datapath for Red Hat\nEnterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OVN, the Open Virtual Network, is a system to support virtual network\nabstraction. OVN complements the existing capabilities of OVS to add\nnative support for virtual network abstractions, such as virtual L2 and L3\noverlays and security groups.\n\nSecurity fix(es):\n\n* ovn22.03: insufficient validation of BFD packets may lead to denial of service (CVE-2024-2182)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1387",
"url": "https://access.redhat.com/errata/RHSA-2024:1387"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1387.json"
}
],
"title": "Red Hat Security Advisory: ovn22.03 security update",
"tracking": {
"current_release_date": "2025-11-21T18:57:26+00:00",
"generator": {
"date": "2025-11-21T18:57:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:1387",
"initial_release_date": "2024-03-19T15:39:52+00:00",
"revision_history": [
{
"date": "2024-03-19T15:39:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-03-19T15:39:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:57:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fast Datapath for Red Hat Enterprise Linux 8",
"product": {
"name": "Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::fastdatapath"
}
}
}
],
"category": "product_family",
"name": "Fast Datapath"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.03-0:22.03.3-71.el8fdp.src",
"product": {
"name": "ovn22.03-0:22.03.3-71.el8fdp.src",
"product_id": "ovn22.03-0:22.03.3-71.el8fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el8fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.03-0:22.03.3-71.el8fdp.x86_64",
"product": {
"name": "ovn22.03-0:22.03.3-71.el8fdp.x86_64",
"product_id": "ovn22.03-0:22.03.3-71.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-0:22.03.3-71.el8fdp.x86_64",
"product": {
"name": "ovn22.03-central-0:22.03.3-71.el8fdp.x86_64",
"product_id": "ovn22.03-central-0:22.03.3-71.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central@22.03.3-71.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-0:22.03.3-71.el8fdp.x86_64",
"product": {
"name": "ovn22.03-host-0:22.03.3-71.el8fdp.x86_64",
"product_id": "ovn22.03-host-0:22.03.3-71.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host@22.03.3-71.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.x86_64",
"product": {
"name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.x86_64",
"product_id": "ovn22.03-vtep-0:22.03.3-71.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.3-71.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.x86_64",
"product": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.x86_64",
"product_id": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.3-71.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"product": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"product_id": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.3-71.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"product": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"product_id": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.3-71.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"product": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"product_id": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.3-71.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"product": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"product_id": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.3-71.el8fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.03-0:22.03.3-71.el8fdp.ppc64le",
"product": {
"name": "ovn22.03-0:22.03.3-71.el8fdp.ppc64le",
"product_id": "ovn22.03-0:22.03.3-71.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-0:22.03.3-71.el8fdp.ppc64le",
"product": {
"name": "ovn22.03-central-0:22.03.3-71.el8fdp.ppc64le",
"product_id": "ovn22.03-central-0:22.03.3-71.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central@22.03.3-71.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-0:22.03.3-71.el8fdp.ppc64le",
"product": {
"name": "ovn22.03-host-0:22.03.3-71.el8fdp.ppc64le",
"product_id": "ovn22.03-host-0:22.03.3-71.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host@22.03.3-71.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.ppc64le",
"product": {
"name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.ppc64le",
"product_id": "ovn22.03-vtep-0:22.03.3-71.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.3-71.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.ppc64le",
"product": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.ppc64le",
"product_id": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.3-71.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"product": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"product_id": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.3-71.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"product": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"product_id": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.3-71.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"product": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"product_id": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.3-71.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"product": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"product_id": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.3-71.el8fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.03-0:22.03.3-71.el8fdp.aarch64",
"product": {
"name": "ovn22.03-0:22.03.3-71.el8fdp.aarch64",
"product_id": "ovn22.03-0:22.03.3-71.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-0:22.03.3-71.el8fdp.aarch64",
"product": {
"name": "ovn22.03-central-0:22.03.3-71.el8fdp.aarch64",
"product_id": "ovn22.03-central-0:22.03.3-71.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central@22.03.3-71.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-0:22.03.3-71.el8fdp.aarch64",
"product": {
"name": "ovn22.03-host-0:22.03.3-71.el8fdp.aarch64",
"product_id": "ovn22.03-host-0:22.03.3-71.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host@22.03.3-71.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.aarch64",
"product": {
"name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.aarch64",
"product_id": "ovn22.03-vtep-0:22.03.3-71.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.3-71.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.aarch64",
"product": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.aarch64",
"product_id": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.3-71.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"product": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"product_id": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.3-71.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"product": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"product_id": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.3-71.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"product": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"product_id": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.3-71.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"product": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"product_id": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.3-71.el8fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn22.03-0:22.03.3-71.el8fdp.s390x",
"product": {
"name": "ovn22.03-0:22.03.3-71.el8fdp.s390x",
"product_id": "ovn22.03-0:22.03.3-71.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03@22.03.3-71.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-0:22.03.3-71.el8fdp.s390x",
"product": {
"name": "ovn22.03-central-0:22.03.3-71.el8fdp.s390x",
"product_id": "ovn22.03-central-0:22.03.3-71.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central@22.03.3-71.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-0:22.03.3-71.el8fdp.s390x",
"product": {
"name": "ovn22.03-host-0:22.03.3-71.el8fdp.s390x",
"product_id": "ovn22.03-host-0:22.03.3-71.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host@22.03.3-71.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.s390x",
"product": {
"name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.s390x",
"product_id": "ovn22.03-vtep-0:22.03.3-71.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.3-71.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.s390x",
"product": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.s390x",
"product_id": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.3-71.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.s390x",
"product": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.s390x",
"product_id": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.3-71.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.s390x",
"product": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.s390x",
"product_id": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.3-71.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.s390x",
"product": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.s390x",
"product_id": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.3-71.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.s390x",
"product": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.s390x",
"product_id": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.3-71.el8fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-0:22.03.3-71.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.aarch64"
},
"product_reference": "ovn22.03-0:22.03.3-71.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-0:22.03.3-71.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.ppc64le"
},
"product_reference": "ovn22.03-0:22.03.3-71.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-0:22.03.3-71.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.s390x"
},
"product_reference": "ovn22.03-0:22.03.3-71.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-0:22.03.3-71.el8fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.src"
},
"product_reference": "ovn22.03-0:22.03.3-71.el8fdp.src",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-0:22.03.3-71.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.x86_64"
},
"product_reference": "ovn22.03-0:22.03.3-71.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-0:22.03.3-71.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.aarch64"
},
"product_reference": "ovn22.03-central-0:22.03.3-71.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-0:22.03.3-71.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.ppc64le"
},
"product_reference": "ovn22.03-central-0:22.03.3-71.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-0:22.03.3-71.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.s390x"
},
"product_reference": "ovn22.03-central-0:22.03.3-71.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-0:22.03.3-71.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.x86_64"
},
"product_reference": "ovn22.03-central-0:22.03.3-71.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.aarch64"
},
"product_reference": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.ppc64le"
},
"product_reference": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.s390x"
},
"product_reference": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.x86_64"
},
"product_reference": "ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.aarch64"
},
"product_reference": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.ppc64le"
},
"product_reference": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.s390x"
},
"product_reference": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.x86_64"
},
"product_reference": "ovn22.03-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.aarch64"
},
"product_reference": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.ppc64le"
},
"product_reference": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.s390x"
},
"product_reference": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.x86_64"
},
"product_reference": "ovn22.03-debugsource-0:22.03.3-71.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-0:22.03.3-71.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.aarch64"
},
"product_reference": "ovn22.03-host-0:22.03.3-71.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-0:22.03.3-71.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.ppc64le"
},
"product_reference": "ovn22.03-host-0:22.03.3-71.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-0:22.03.3-71.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.s390x"
},
"product_reference": "ovn22.03-host-0:22.03.3-71.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-0:22.03.3-71.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.x86_64"
},
"product_reference": "ovn22.03-host-0:22.03.3-71.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.aarch64"
},
"product_reference": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.ppc64le"
},
"product_reference": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.s390x"
},
"product_reference": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.x86_64"
},
"product_reference": "ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.aarch64"
},
"product_reference": "ovn22.03-vtep-0:22.03.3-71.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.ppc64le"
},
"product_reference": "ovn22.03-vtep-0:22.03.3-71.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.s390x"
},
"product_reference": "ovn22.03-vtep-0:22.03.3-71.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-0:22.03.3-71.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.x86_64"
},
"product_reference": "ovn22.03-vtep-0:22.03.3-71.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.aarch64"
},
"product_reference": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.ppc64le"
},
"product_reference": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.s390x"
},
"product_reference": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.x86_64"
},
"product_reference": "ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Frode Nordahl"
],
"organization": "Canonical"
}
],
"cve": "CVE-2024-2182",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2024-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: insufficient validation of BFD packets may lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.src",
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"category": "external",
"summary": "RHBZ#2267840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2182"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182"
},
{
"category": "external",
"summary": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html",
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/03/12/5",
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
}
],
"release_date": "2024-03-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:39:52+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.src",
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1387"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.src",
"8Base-Fast-Datapath:ovn22.03-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-central-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-central-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-debugsource-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-host-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-host-debuginfo-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-vtep-0:22.03.3-71.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.s390x",
"8Base-Fast-Datapath:ovn22.03-vtep-debuginfo-0:22.03.3-71.el8fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ovn: insufficient validation of BFD packets may lead to denial of service"
}
]
}
SUSE-SU-2026:0280-1
Vulnerability from csaf_suse - Published: 2026-01-23 15:33 - Updated: 2026-01-23 15:33Summary
Security update for openvswitch
Notes
Title of the patch
Security update for openvswitch
Description of the patch
This update for openvswitch fixes the following issues:
Update to v3.1.7:
- CVE-2023-3966: openvswitch, openvswitch3: Invalid memory access in Geneve with HW offload (bsc#1219465).
- CVE-2024-2182: openvswitch: ov: insufficient validation of incoming BFD packets may lead to denial of service (bsc#1255435).
- CVE-2023-1668: openvswitch: remote traffic denial of service via crafted packets with IP proto 0 (bsc#1210054).
- CVE-2023-3153: openvswitch,openvswitch3: service monitor MAC flow is not rate limited (bsc#1212125).
- CVE-2023-5366: openvswitch: missing masks on a final stage with ports trie (bsc#1216002).
Patchnames
SUSE-2026-280,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-280,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-280,openSUSE-SLE-15.6-2026-280
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openvswitch",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openvswitch fixes the following issues:\n\nUpdate to v3.1.7:\n\n - CVE-2023-3966: openvswitch, openvswitch3: Invalid memory access in Geneve with HW offload (bsc#1219465).\n - CVE-2024-2182: openvswitch: ov: insufficient validation of incoming BFD packets may lead to denial of service (bsc#1255435).\n - CVE-2023-1668: openvswitch: remote traffic denial of service via crafted packets with IP proto 0 (bsc#1210054).\n - CVE-2023-3153: openvswitch,openvswitch3: service monitor MAC flow is not rate limited (bsc#1212125).\n - CVE-2023-5366: openvswitch: missing masks on a final stage with ports trie (bsc#1216002).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-280,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-280,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-280,openSUSE-SLE-15.6-2026-280",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0280-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0280-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260280-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0280-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023908.html"
},
{
"category": "self",
"summary": "SUSE Bug 1210054",
"url": "https://bugzilla.suse.com/1210054"
},
{
"category": "self",
"summary": "SUSE Bug 1212125",
"url": "https://bugzilla.suse.com/1212125"
},
{
"category": "self",
"summary": "SUSE Bug 1216002",
"url": "https://bugzilla.suse.com/1216002"
},
{
"category": "self",
"summary": "SUSE Bug 1219465",
"url": "https://bugzilla.suse.com/1219465"
},
{
"category": "self",
"summary": "SUSE Bug 1255435",
"url": "https://bugzilla.suse.com/1255435"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1668 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1668/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3152 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3152/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3153 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3966 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3966/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-5366 page",
"url": "https://www.suse.com/security/cve/CVE-2023-5366/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-2182 page",
"url": "https://www.suse.com/security/cve/CVE-2024-2182/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-0650 page",
"url": "https://www.suse.com/security/cve/CVE-2025-0650/"
}
],
"title": "Security update for openvswitch",
"tracking": {
"current_release_date": "2026-01-23T15:33:56Z",
"generator": {
"date": "2026-01-23T15:33:56Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0280-1",
"initial_release_date": "2026-01-23T15:33:56Z",
"revision_history": [
{
"date": "2026-01-23T15:33:56Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"product": {
"name": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"product_id": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"product": {
"name": "libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"product_id": "libovn-23_03-0-23.03.3-150600.33.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvswitch-3.1.7-150600.33.9.1.aarch64",
"product": {
"name": "openvswitch-3.1.7-150600.33.9.1.aarch64",
"product_id": "openvswitch-3.1.7-150600.33.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"product": {
"name": "openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"product_id": "openvswitch-devel-3.1.7-150600.33.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"product": {
"name": "openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"product_id": "openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"product": {
"name": "openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"product_id": "openvswitch-pki-3.1.7-150600.33.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"product": {
"name": "openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"product_id": "openvswitch-test-3.1.7-150600.33.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"product": {
"name": "openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"product_id": "openvswitch-vtep-3.1.7-150600.33.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "ovn-23.03.3-150600.33.9.1.aarch64",
"product": {
"name": "ovn-23.03.3-150600.33.9.1.aarch64",
"product_id": "ovn-23.03.3-150600.33.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "ovn-central-23.03.3-150600.33.9.1.aarch64",
"product": {
"name": "ovn-central-23.03.3-150600.33.9.1.aarch64",
"product_id": "ovn-central-23.03.3-150600.33.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "ovn-devel-23.03.3-150600.33.9.1.aarch64",
"product": {
"name": "ovn-devel-23.03.3-150600.33.9.1.aarch64",
"product_id": "ovn-devel-23.03.3-150600.33.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "ovn-docker-23.03.3-150600.33.9.1.aarch64",
"product": {
"name": "ovn-docker-23.03.3-150600.33.9.1.aarch64",
"product_id": "ovn-docker-23.03.3-150600.33.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "ovn-host-23.03.3-150600.33.9.1.aarch64",
"product": {
"name": "ovn-host-23.03.3-150600.33.9.1.aarch64",
"product_id": "ovn-host-23.03.3-150600.33.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"product": {
"name": "ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"product_id": "ovn-vtep-23.03.3-150600.33.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-ovs-3.1.7-150600.33.9.1.aarch64",
"product": {
"name": "python3-ovs-3.1.7-150600.33.9.1.aarch64",
"product_id": "python3-ovs-3.1.7-150600.33.9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.i586",
"product": {
"name": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.i586",
"product_id": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.i586"
}
},
{
"category": "product_version",
"name": "libovn-23_03-0-23.03.3-150600.33.9.1.i586",
"product": {
"name": "libovn-23_03-0-23.03.3-150600.33.9.1.i586",
"product_id": "libovn-23_03-0-23.03.3-150600.33.9.1.i586"
}
},
{
"category": "product_version",
"name": "openvswitch-3.1.7-150600.33.9.1.i586",
"product": {
"name": "openvswitch-3.1.7-150600.33.9.1.i586",
"product_id": "openvswitch-3.1.7-150600.33.9.1.i586"
}
},
{
"category": "product_version",
"name": "openvswitch-devel-3.1.7-150600.33.9.1.i586",
"product": {
"name": "openvswitch-devel-3.1.7-150600.33.9.1.i586",
"product_id": "openvswitch-devel-3.1.7-150600.33.9.1.i586"
}
},
{
"category": "product_version",
"name": "openvswitch-ipsec-3.1.7-150600.33.9.1.i586",
"product": {
"name": "openvswitch-ipsec-3.1.7-150600.33.9.1.i586",
"product_id": "openvswitch-ipsec-3.1.7-150600.33.9.1.i586"
}
},
{
"category": "product_version",
"name": "openvswitch-pki-3.1.7-150600.33.9.1.i586",
"product": {
"name": "openvswitch-pki-3.1.7-150600.33.9.1.i586",
"product_id": "openvswitch-pki-3.1.7-150600.33.9.1.i586"
}
},
{
"category": "product_version",
"name": "openvswitch-test-3.1.7-150600.33.9.1.i586",
"product": {
"name": "openvswitch-test-3.1.7-150600.33.9.1.i586",
"product_id": "openvswitch-test-3.1.7-150600.33.9.1.i586"
}
},
{
"category": "product_version",
"name": "openvswitch-vtep-3.1.7-150600.33.9.1.i586",
"product": {
"name": "openvswitch-vtep-3.1.7-150600.33.9.1.i586",
"product_id": "openvswitch-vtep-3.1.7-150600.33.9.1.i586"
}
},
{
"category": "product_version",
"name": "ovn-23.03.3-150600.33.9.1.i586",
"product": {
"name": "ovn-23.03.3-150600.33.9.1.i586",
"product_id": "ovn-23.03.3-150600.33.9.1.i586"
}
},
{
"category": "product_version",
"name": "ovn-central-23.03.3-150600.33.9.1.i586",
"product": {
"name": "ovn-central-23.03.3-150600.33.9.1.i586",
"product_id": "ovn-central-23.03.3-150600.33.9.1.i586"
}
},
{
"category": "product_version",
"name": "ovn-devel-23.03.3-150600.33.9.1.i586",
"product": {
"name": "ovn-devel-23.03.3-150600.33.9.1.i586",
"product_id": "ovn-devel-23.03.3-150600.33.9.1.i586"
}
},
{
"category": "product_version",
"name": "ovn-docker-23.03.3-150600.33.9.1.i586",
"product": {
"name": "ovn-docker-23.03.3-150600.33.9.1.i586",
"product_id": "ovn-docker-23.03.3-150600.33.9.1.i586"
}
},
{
"category": "product_version",
"name": "ovn-host-23.03.3-150600.33.9.1.i586",
"product": {
"name": "ovn-host-23.03.3-150600.33.9.1.i586",
"product_id": "ovn-host-23.03.3-150600.33.9.1.i586"
}
},
{
"category": "product_version",
"name": "ovn-vtep-23.03.3-150600.33.9.1.i586",
"product": {
"name": "ovn-vtep-23.03.3-150600.33.9.1.i586",
"product_id": "ovn-vtep-23.03.3-150600.33.9.1.i586"
}
},
{
"category": "product_version",
"name": "python3-ovs-3.1.7-150600.33.9.1.i586",
"product": {
"name": "python3-ovs-3.1.7-150600.33.9.1.i586",
"product_id": "python3-ovs-3.1.7-150600.33.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "openvswitch-doc-3.1.7-150600.33.9.1.noarch",
"product": {
"name": "openvswitch-doc-3.1.7-150600.33.9.1.noarch",
"product_id": "openvswitch-doc-3.1.7-150600.33.9.1.noarch"
}
},
{
"category": "product_version",
"name": "ovn-doc-23.03.3-150600.33.9.1.noarch",
"product": {
"name": "ovn-doc-23.03.3-150600.33.9.1.noarch",
"product_id": "ovn-doc-23.03.3-150600.33.9.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"product": {
"name": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"product_id": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"product": {
"name": "libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"product_id": "libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvswitch-3.1.7-150600.33.9.1.ppc64le",
"product": {
"name": "openvswitch-3.1.7-150600.33.9.1.ppc64le",
"product_id": "openvswitch-3.1.7-150600.33.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"product": {
"name": "openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"product_id": "openvswitch-devel-3.1.7-150600.33.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"product": {
"name": "openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"product_id": "openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"product": {
"name": "openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"product_id": "openvswitch-pki-3.1.7-150600.33.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"product": {
"name": "openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"product_id": "openvswitch-test-3.1.7-150600.33.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"product": {
"name": "openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"product_id": "openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ovn-23.03.3-150600.33.9.1.ppc64le",
"product": {
"name": "ovn-23.03.3-150600.33.9.1.ppc64le",
"product_id": "ovn-23.03.3-150600.33.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ovn-central-23.03.3-150600.33.9.1.ppc64le",
"product": {
"name": "ovn-central-23.03.3-150600.33.9.1.ppc64le",
"product_id": "ovn-central-23.03.3-150600.33.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"product": {
"name": "ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"product_id": "ovn-devel-23.03.3-150600.33.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"product": {
"name": "ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"product_id": "ovn-docker-23.03.3-150600.33.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ovn-host-23.03.3-150600.33.9.1.ppc64le",
"product": {
"name": "ovn-host-23.03.3-150600.33.9.1.ppc64le",
"product_id": "ovn-host-23.03.3-150600.33.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"product": {
"name": "ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"product_id": "ovn-vtep-23.03.3-150600.33.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"product": {
"name": "python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"product_id": "python3-ovs-3.1.7-150600.33.9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"product": {
"name": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"product_id": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x"
}
},
{
"category": "product_version",
"name": "libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"product": {
"name": "libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"product_id": "libovn-23_03-0-23.03.3-150600.33.9.1.s390x"
}
},
{
"category": "product_version",
"name": "openvswitch-3.1.7-150600.33.9.1.s390x",
"product": {
"name": "openvswitch-3.1.7-150600.33.9.1.s390x",
"product_id": "openvswitch-3.1.7-150600.33.9.1.s390x"
}
},
{
"category": "product_version",
"name": "openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"product": {
"name": "openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"product_id": "openvswitch-devel-3.1.7-150600.33.9.1.s390x"
}
},
{
"category": "product_version",
"name": "openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"product": {
"name": "openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"product_id": "openvswitch-ipsec-3.1.7-150600.33.9.1.s390x"
}
},
{
"category": "product_version",
"name": "openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"product": {
"name": "openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"product_id": "openvswitch-pki-3.1.7-150600.33.9.1.s390x"
}
},
{
"category": "product_version",
"name": "openvswitch-test-3.1.7-150600.33.9.1.s390x",
"product": {
"name": "openvswitch-test-3.1.7-150600.33.9.1.s390x",
"product_id": "openvswitch-test-3.1.7-150600.33.9.1.s390x"
}
},
{
"category": "product_version",
"name": "openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"product": {
"name": "openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"product_id": "openvswitch-vtep-3.1.7-150600.33.9.1.s390x"
}
},
{
"category": "product_version",
"name": "ovn-23.03.3-150600.33.9.1.s390x",
"product": {
"name": "ovn-23.03.3-150600.33.9.1.s390x",
"product_id": "ovn-23.03.3-150600.33.9.1.s390x"
}
},
{
"category": "product_version",
"name": "ovn-central-23.03.3-150600.33.9.1.s390x",
"product": {
"name": "ovn-central-23.03.3-150600.33.9.1.s390x",
"product_id": "ovn-central-23.03.3-150600.33.9.1.s390x"
}
},
{
"category": "product_version",
"name": "ovn-devel-23.03.3-150600.33.9.1.s390x",
"product": {
"name": "ovn-devel-23.03.3-150600.33.9.1.s390x",
"product_id": "ovn-devel-23.03.3-150600.33.9.1.s390x"
}
},
{
"category": "product_version",
"name": "ovn-docker-23.03.3-150600.33.9.1.s390x",
"product": {
"name": "ovn-docker-23.03.3-150600.33.9.1.s390x",
"product_id": "ovn-docker-23.03.3-150600.33.9.1.s390x"
}
},
{
"category": "product_version",
"name": "ovn-host-23.03.3-150600.33.9.1.s390x",
"product": {
"name": "ovn-host-23.03.3-150600.33.9.1.s390x",
"product_id": "ovn-host-23.03.3-150600.33.9.1.s390x"
}
},
{
"category": "product_version",
"name": "ovn-vtep-23.03.3-150600.33.9.1.s390x",
"product": {
"name": "ovn-vtep-23.03.3-150600.33.9.1.s390x",
"product_id": "ovn-vtep-23.03.3-150600.33.9.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-ovs-3.1.7-150600.33.9.1.s390x",
"product": {
"name": "python3-ovs-3.1.7-150600.33.9.1.s390x",
"product_id": "python3-ovs-3.1.7-150600.33.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"product": {
"name": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"product_id": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"product": {
"name": "libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"product_id": "libovn-23_03-0-23.03.3-150600.33.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvswitch-3.1.7-150600.33.9.1.x86_64",
"product": {
"name": "openvswitch-3.1.7-150600.33.9.1.x86_64",
"product_id": "openvswitch-3.1.7-150600.33.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"product": {
"name": "openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"product_id": "openvswitch-devel-3.1.7-150600.33.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"product": {
"name": "openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"product_id": "openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"product": {
"name": "openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"product_id": "openvswitch-pki-3.1.7-150600.33.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"product": {
"name": "openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"product_id": "openvswitch-test-3.1.7-150600.33.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"product": {
"name": "openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"product_id": "openvswitch-vtep-3.1.7-150600.33.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "ovn-23.03.3-150600.33.9.1.x86_64",
"product": {
"name": "ovn-23.03.3-150600.33.9.1.x86_64",
"product_id": "ovn-23.03.3-150600.33.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "ovn-central-23.03.3-150600.33.9.1.x86_64",
"product": {
"name": "ovn-central-23.03.3-150600.33.9.1.x86_64",
"product_id": "ovn-central-23.03.3-150600.33.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "ovn-devel-23.03.3-150600.33.9.1.x86_64",
"product": {
"name": "ovn-devel-23.03.3-150600.33.9.1.x86_64",
"product_id": "ovn-devel-23.03.3-150600.33.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "ovn-docker-23.03.3-150600.33.9.1.x86_64",
"product": {
"name": "ovn-docker-23.03.3-150600.33.9.1.x86_64",
"product_id": "ovn-docker-23.03.3-150600.33.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "ovn-host-23.03.3-150600.33.9.1.x86_64",
"product": {
"name": "ovn-host-23.03.3-150600.33.9.1.x86_64",
"product_id": "ovn-host-23.03.3-150600.33.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"product": {
"name": "ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"product_id": "ovn-vtep-23.03.3-150600.33.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-ovs-3.1.7-150600.33.9.1.x86_64",
"product": {
"name": "python3-ovs-3.1.7-150600.33.9.1.x86_64",
"product_id": "python3-ovs-3.1.7-150600.33.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64"
},
"product_reference": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le"
},
"product_reference": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x"
},
"product_reference": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64"
},
"product_reference": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libovn-23_03-0-23.03.3-150600.33.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64"
},
"product_reference": "libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le"
},
"product_reference": "libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libovn-23_03-0-23.03.3-150600.33.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.s390x"
},
"product_reference": "libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libovn-23_03-0-23.03.3-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64"
},
"product_reference": "libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-3.1.7-150600.33.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.aarch64"
},
"product_reference": "openvswitch-3.1.7-150600.33.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-3.1.7-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.ppc64le"
},
"product_reference": "openvswitch-3.1.7-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-3.1.7-150600.33.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.s390x"
},
"product_reference": "openvswitch-3.1.7-150600.33.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-3.1.7-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.x86_64"
},
"product_reference": "openvswitch-3.1.7-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-devel-3.1.7-150600.33.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.aarch64"
},
"product_reference": "openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-devel-3.1.7-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le"
},
"product_reference": "openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-devel-3.1.7-150600.33.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.s390x"
},
"product_reference": "openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-devel-3.1.7-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.x86_64"
},
"product_reference": "openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64"
},
"product_reference": "openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le"
},
"product_reference": "openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-ipsec-3.1.7-150600.33.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x"
},
"product_reference": "openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64"
},
"product_reference": "openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-pki-3.1.7-150600.33.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.aarch64"
},
"product_reference": "openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-pki-3.1.7-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le"
},
"product_reference": "openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-pki-3.1.7-150600.33.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.s390x"
},
"product_reference": "openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-pki-3.1.7-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.x86_64"
},
"product_reference": "openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-test-3.1.7-150600.33.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.aarch64"
},
"product_reference": "openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-test-3.1.7-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.ppc64le"
},
"product_reference": "openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-test-3.1.7-150600.33.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.s390x"
},
"product_reference": "openvswitch-test-3.1.7-150600.33.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-test-3.1.7-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.x86_64"
},
"product_reference": "openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-vtep-3.1.7-150600.33.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64"
},
"product_reference": "openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le"
},
"product_reference": "openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-vtep-3.1.7-150600.33.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.s390x"
},
"product_reference": "openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-vtep-3.1.7-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64"
},
"product_reference": "openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-23.03.3-150600.33.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.aarch64"
},
"product_reference": "ovn-23.03.3-150600.33.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-23.03.3-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.ppc64le"
},
"product_reference": "ovn-23.03.3-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-23.03.3-150600.33.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.s390x"
},
"product_reference": "ovn-23.03.3-150600.33.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-23.03.3-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.x86_64"
},
"product_reference": "ovn-23.03.3-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-central-23.03.3-150600.33.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.aarch64"
},
"product_reference": "ovn-central-23.03.3-150600.33.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-central-23.03.3-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.ppc64le"
},
"product_reference": "ovn-central-23.03.3-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-central-23.03.3-150600.33.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.s390x"
},
"product_reference": "ovn-central-23.03.3-150600.33.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-central-23.03.3-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.x86_64"
},
"product_reference": "ovn-central-23.03.3-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-devel-23.03.3-150600.33.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.aarch64"
},
"product_reference": "ovn-devel-23.03.3-150600.33.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-devel-23.03.3-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.ppc64le"
},
"product_reference": "ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-devel-23.03.3-150600.33.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.s390x"
},
"product_reference": "ovn-devel-23.03.3-150600.33.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-devel-23.03.3-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.x86_64"
},
"product_reference": "ovn-devel-23.03.3-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-docker-23.03.3-150600.33.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.aarch64"
},
"product_reference": "ovn-docker-23.03.3-150600.33.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-docker-23.03.3-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.ppc64le"
},
"product_reference": "ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-docker-23.03.3-150600.33.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.s390x"
},
"product_reference": "ovn-docker-23.03.3-150600.33.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-docker-23.03.3-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.x86_64"
},
"product_reference": "ovn-docker-23.03.3-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-host-23.03.3-150600.33.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.aarch64"
},
"product_reference": "ovn-host-23.03.3-150600.33.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-host-23.03.3-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.ppc64le"
},
"product_reference": "ovn-host-23.03.3-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-host-23.03.3-150600.33.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.s390x"
},
"product_reference": "ovn-host-23.03.3-150600.33.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-host-23.03.3-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.x86_64"
},
"product_reference": "ovn-host-23.03.3-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-vtep-23.03.3-150600.33.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.aarch64"
},
"product_reference": "ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-vtep-23.03.3-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.ppc64le"
},
"product_reference": "ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-vtep-23.03.3-150600.33.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.s390x"
},
"product_reference": "ovn-vtep-23.03.3-150600.33.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-vtep-23.03.3-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.x86_64"
},
"product_reference": "ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ovs-3.1.7-150600.33.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.aarch64"
},
"product_reference": "python3-ovs-3.1.7-150600.33.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ovs-3.1.7-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.ppc64le"
},
"product_reference": "python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ovs-3.1.7-150600.33.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.s390x"
},
"product_reference": "python3-ovs-3.1.7-150600.33.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ovs-3.1.7-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.x86_64"
},
"product_reference": "python3-ovs-3.1.7-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le"
},
"product_reference": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64"
},
"product_reference": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le"
},
"product_reference": "libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libovn-23_03-0-23.03.3-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64"
},
"product_reference": "libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-3.1.7-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.ppc64le"
},
"product_reference": "openvswitch-3.1.7-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-3.1.7-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.x86_64"
},
"product_reference": "openvswitch-3.1.7-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-devel-3.1.7-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le"
},
"product_reference": "openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-devel-3.1.7-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64"
},
"product_reference": "openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le"
},
"product_reference": "openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64"
},
"product_reference": "openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-pki-3.1.7-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le"
},
"product_reference": "openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-pki-3.1.7-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64"
},
"product_reference": "openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-test-3.1.7-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le"
},
"product_reference": "openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-test-3.1.7-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.x86_64"
},
"product_reference": "openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le"
},
"product_reference": "openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-vtep-3.1.7-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64"
},
"product_reference": "openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-23.03.3-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.ppc64le"
},
"product_reference": "ovn-23.03.3-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-23.03.3-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.x86_64"
},
"product_reference": "ovn-23.03.3-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-central-23.03.3-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.ppc64le"
},
"product_reference": "ovn-central-23.03.3-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-central-23.03.3-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.x86_64"
},
"product_reference": "ovn-central-23.03.3-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-devel-23.03.3-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.ppc64le"
},
"product_reference": "ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-devel-23.03.3-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.x86_64"
},
"product_reference": "ovn-devel-23.03.3-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-docker-23.03.3-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.ppc64le"
},
"product_reference": "ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-docker-23.03.3-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.x86_64"
},
"product_reference": "ovn-docker-23.03.3-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-host-23.03.3-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.ppc64le"
},
"product_reference": "ovn-host-23.03.3-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-host-23.03.3-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.x86_64"
},
"product_reference": "ovn-host-23.03.3-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-vtep-23.03.3-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le"
},
"product_reference": "ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-vtep-23.03.3-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.x86_64"
},
"product_reference": "ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ovs-3.1.7-150600.33.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.ppc64le"
},
"product_reference": "python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ovs-3.1.7-150600.33.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.x86_64"
},
"product_reference": "python3-ovs-3.1.7-150600.33.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64"
},
"product_reference": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le"
},
"product_reference": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x"
},
"product_reference": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64"
},
"product_reference": "libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libovn-23_03-0-23.03.3-150600.33.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64"
},
"product_reference": "libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le"
},
"product_reference": "libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libovn-23_03-0-23.03.3-150600.33.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.s390x"
},
"product_reference": "libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libovn-23_03-0-23.03.3-150600.33.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64"
},
"product_reference": "libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-3.1.7-150600.33.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.aarch64"
},
"product_reference": "openvswitch-3.1.7-150600.33.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-3.1.7-150600.33.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.ppc64le"
},
"product_reference": "openvswitch-3.1.7-150600.33.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-3.1.7-150600.33.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.s390x"
},
"product_reference": "openvswitch-3.1.7-150600.33.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-3.1.7-150600.33.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.x86_64"
},
"product_reference": "openvswitch-3.1.7-150600.33.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-devel-3.1.7-150600.33.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.aarch64"
},
"product_reference": "openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-devel-3.1.7-150600.33.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le"
},
"product_reference": "openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-devel-3.1.7-150600.33.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.s390x"
},
"product_reference": "openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-devel-3.1.7-150600.33.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64"
},
"product_reference": "openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-doc-3.1.7-150600.33.9.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvswitch-doc-3.1.7-150600.33.9.1.noarch"
},
"product_reference": "openvswitch-doc-3.1.7-150600.33.9.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64"
},
"product_reference": "openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le"
},
"product_reference": "openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-ipsec-3.1.7-150600.33.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x"
},
"product_reference": "openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64"
},
"product_reference": "openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-pki-3.1.7-150600.33.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.aarch64"
},
"product_reference": "openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-pki-3.1.7-150600.33.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le"
},
"product_reference": "openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-pki-3.1.7-150600.33.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.s390x"
},
"product_reference": "openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-pki-3.1.7-150600.33.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64"
},
"product_reference": "openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-test-3.1.7-150600.33.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.aarch64"
},
"product_reference": "openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-test-3.1.7-150600.33.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le"
},
"product_reference": "openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-test-3.1.7-150600.33.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.s390x"
},
"product_reference": "openvswitch-test-3.1.7-150600.33.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-test-3.1.7-150600.33.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.x86_64"
},
"product_reference": "openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-vtep-3.1.7-150600.33.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64"
},
"product_reference": "openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le"
},
"product_reference": "openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-vtep-3.1.7-150600.33.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.s390x"
},
"product_reference": "openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch-vtep-3.1.7-150600.33.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64"
},
"product_reference": "openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-23.03.3-150600.33.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.aarch64"
},
"product_reference": "ovn-23.03.3-150600.33.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-23.03.3-150600.33.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.ppc64le"
},
"product_reference": "ovn-23.03.3-150600.33.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-23.03.3-150600.33.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.s390x"
},
"product_reference": "ovn-23.03.3-150600.33.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-23.03.3-150600.33.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.x86_64"
},
"product_reference": "ovn-23.03.3-150600.33.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-central-23.03.3-150600.33.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.aarch64"
},
"product_reference": "ovn-central-23.03.3-150600.33.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-central-23.03.3-150600.33.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.ppc64le"
},
"product_reference": "ovn-central-23.03.3-150600.33.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-central-23.03.3-150600.33.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.s390x"
},
"product_reference": "ovn-central-23.03.3-150600.33.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-central-23.03.3-150600.33.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.x86_64"
},
"product_reference": "ovn-central-23.03.3-150600.33.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-devel-23.03.3-150600.33.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.aarch64"
},
"product_reference": "ovn-devel-23.03.3-150600.33.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-devel-23.03.3-150600.33.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.ppc64le"
},
"product_reference": "ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-devel-23.03.3-150600.33.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.s390x"
},
"product_reference": "ovn-devel-23.03.3-150600.33.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-devel-23.03.3-150600.33.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.x86_64"
},
"product_reference": "ovn-devel-23.03.3-150600.33.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-doc-23.03.3-150600.33.9.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ovn-doc-23.03.3-150600.33.9.1.noarch"
},
"product_reference": "ovn-doc-23.03.3-150600.33.9.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-docker-23.03.3-150600.33.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.aarch64"
},
"product_reference": "ovn-docker-23.03.3-150600.33.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-docker-23.03.3-150600.33.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.ppc64le"
},
"product_reference": "ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-docker-23.03.3-150600.33.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.s390x"
},
"product_reference": "ovn-docker-23.03.3-150600.33.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-docker-23.03.3-150600.33.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.x86_64"
},
"product_reference": "ovn-docker-23.03.3-150600.33.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-host-23.03.3-150600.33.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.aarch64"
},
"product_reference": "ovn-host-23.03.3-150600.33.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-host-23.03.3-150600.33.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.ppc64le"
},
"product_reference": "ovn-host-23.03.3-150600.33.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-host-23.03.3-150600.33.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.s390x"
},
"product_reference": "ovn-host-23.03.3-150600.33.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-host-23.03.3-150600.33.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.x86_64"
},
"product_reference": "ovn-host-23.03.3-150600.33.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-vtep-23.03.3-150600.33.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.aarch64"
},
"product_reference": "ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-vtep-23.03.3-150600.33.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le"
},
"product_reference": "ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-vtep-23.03.3-150600.33.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.s390x"
},
"product_reference": "ovn-vtep-23.03.3-150600.33.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-vtep-23.03.3-150600.33.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.x86_64"
},
"product_reference": "ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ovs-3.1.7-150600.33.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.aarch64"
},
"product_reference": "python3-ovs-3.1.7-150600.33.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ovs-3.1.7-150600.33.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.ppc64le"
},
"product_reference": "python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ovs-3.1.7-150600.33.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.s390x"
},
"product_reference": "python3-ovs-3.1.7-150600.33.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ovs-3.1.7-150600.33.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.x86_64"
},
"product_reference": "python3-ovs-3.1.7-150600.33.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-1668",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1668"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-doc-3.1.7-150600.33.9.1.noarch",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-doc-23.03.3-150600.33.9.1.noarch",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1668",
"url": "https://www.suse.com/security/cve/CVE-2023-1668"
},
{
"category": "external",
"summary": "SUSE Bug 1210054 for CVE-2023-1668",
"url": "https://bugzilla.suse.com/1210054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-doc-3.1.7-150600.33.9.1.noarch",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-doc-23.03.3-150600.33.9.1.noarch",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-doc-3.1.7-150600.33.9.1.noarch",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-doc-23.03.3-150600.33.9.1.noarch",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-23T15:33:56Z",
"details": "moderate"
}
],
"title": "CVE-2023-1668"
},
{
"cve": "CVE-2023-3152",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3152"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability classified as critical has been found in SourceCodester Online Discussion Forum Site 1.0. This affects an unknown part of the file admin\\posts\\view_post.php. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231021 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-doc-3.1.7-150600.33.9.1.noarch",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-doc-23.03.3-150600.33.9.1.noarch",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3152",
"url": "https://www.suse.com/security/cve/CVE-2023-3152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-doc-3.1.7-150600.33.9.1.noarch",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-doc-23.03.3-150600.33.9.1.noarch",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-doc-3.1.7-150600.33.9.1.noarch",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-doc-23.03.3-150600.33.9.1.noarch",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-23T15:33:56Z",
"details": "important"
}
],
"title": "CVE-2023-3152"
},
{
"cve": "CVE-2023-3153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3153"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Open Virtual Network where the service monitor MAC does not properly rate limit. This issue could allow an attacker to cause a denial of service, including on deployments with CoPP enabled and properly configured.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-doc-3.1.7-150600.33.9.1.noarch",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-doc-23.03.3-150600.33.9.1.noarch",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3153",
"url": "https://www.suse.com/security/cve/CVE-2023-3153"
},
{
"category": "external",
"summary": "SUSE Bug 1212125 for CVE-2023-3153",
"url": "https://bugzilla.suse.com/1212125"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-doc-3.1.7-150600.33.9.1.noarch",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-doc-23.03.3-150600.33.9.1.noarch",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-doc-3.1.7-150600.33.9.1.noarch",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-doc-23.03.3-150600.33.9.1.noarch",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-23T15:33:56Z",
"details": "moderate"
}
],
"title": "CVE-2023-3153"
},
{
"cve": "CVE-2023-3966",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3966"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Open vSwitch where multiple versions are vulnerable to crafted Geneve packets, which may result in a denial of service and invalid memory accesses. Triggering this issue requires that hardware offloading via the netlink path is enabled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-doc-3.1.7-150600.33.9.1.noarch",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-doc-23.03.3-150600.33.9.1.noarch",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3966",
"url": "https://www.suse.com/security/cve/CVE-2023-3966"
},
{
"category": "external",
"summary": "SUSE Bug 1219465 for CVE-2023-3966",
"url": "https://bugzilla.suse.com/1219465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-doc-3.1.7-150600.33.9.1.noarch",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-doc-23.03.3-150600.33.9.1.noarch",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-doc-3.1.7-150600.33.9.1.noarch",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-doc-23.03.3-150600.33.9.1.noarch",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-23T15:33:56Z",
"details": "important"
}
],
"title": "CVE-2023-3966"
},
{
"cve": "CVE-2023-5366",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-5366"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-doc-3.1.7-150600.33.9.1.noarch",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-doc-23.03.3-150600.33.9.1.noarch",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-5366",
"url": "https://www.suse.com/security/cve/CVE-2023-5366"
},
{
"category": "external",
"summary": "SUSE Bug 1216002 for CVE-2023-5366",
"url": "https://bugzilla.suse.com/1216002"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-doc-3.1.7-150600.33.9.1.noarch",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-doc-23.03.3-150600.33.9.1.noarch",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-doc-3.1.7-150600.33.9.1.noarch",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-doc-23.03.3-150600.33.9.1.noarch",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-23T15:33:56Z",
"details": "important"
}
],
"title": "CVE-2023-5366"
},
{
"cve": "CVE-2024-2182",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-2182"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-doc-3.1.7-150600.33.9.1.noarch",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-doc-23.03.3-150600.33.9.1.noarch",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-2182",
"url": "https://www.suse.com/security/cve/CVE-2024-2182"
},
{
"category": "external",
"summary": "SUSE Bug 1255435 for CVE-2024-2182",
"url": "https://bugzilla.suse.com/1255435"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-doc-3.1.7-150600.33.9.1.noarch",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-doc-23.03.3-150600.33.9.1.noarch",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-doc-3.1.7-150600.33.9.1.noarch",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-doc-23.03.3-150600.33.9.1.noarch",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-23T15:33:56Z",
"details": "moderate"
}
],
"title": "CVE-2024-2182"
},
{
"cve": "CVE-2025-0650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-0650"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Open Virtual Network (OVN). Specially crafted UDP packets may bypass egress access control lists (ACLs) in OVN installations configured with a logical switch with DNS records set on it and if the same switch has any egress ACLs configured. This issue can lead to unauthorized access to virtual machines and containers running on the OVN network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-doc-3.1.7-150600.33.9.1.noarch",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-doc-23.03.3-150600.33.9.1.noarch",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-0650",
"url": "https://www.suse.com/security/cve/CVE-2025-0650"
},
{
"category": "external",
"summary": "SUSE Bug 1236353 for CVE-2025-0650",
"url": "https://bugzilla.suse.com/1236353"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-doc-3.1.7-150600.33.9.1.noarch",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-doc-23.03.3-150600.33.9.1.noarch",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:python3-ovs-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libopenvswitch-3_1-0-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:libovn-23_03-0-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-devel-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-doc-3.1.7-150600.33.9.1.noarch",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-ipsec-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-pki-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-test-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:openvswitch-vtep-3.1.7-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-central-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-devel-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-doc-23.03.3-150600.33.9.1.noarch",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-docker-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-host-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.s390x",
"openSUSE Leap 15.6:ovn-vtep-23.03.3-150600.33.9.1.x86_64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.aarch64",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.ppc64le",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.s390x",
"openSUSE Leap 15.6:python3-ovs-3.1.7-150600.33.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-23T15:33:56Z",
"details": "important"
}
],
"title": "CVE-2025-0650"
}
]
}
GHSA-P67C-35G3-9PQC
Vulnerability from github – Published: 2024-03-12 18:31 – Updated: 2024-06-21 00:33
VLAI?
Details
A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.
Severity ?
6.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2024-2182"
],
"database_specific": {
"cwe_ids": [
"CWE-346"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-03-12T17:15:59Z",
"severity": "MODERATE"
},
"details": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.",
"id": "GHSA-p67c-35g3-9pqc",
"modified": "2024-06-21T00:33:10Z",
"published": "2024-03-12T18:31:15Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2182"
},
{
"type": "WEB",
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
},
{
"type": "WEB",
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRKXOOOKD56TY3JQVB45N3GCTX3EG4BV"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CB4N522FCS4XWAPUKRWZF6QZ657FCIDF"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APR4GCVCMQD3DQUKXDNGIXCCYGE5V7IT"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:4035"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:1394"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:1393"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:1392"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:1391"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:1390"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:1388"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:1387"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:1386"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:1385"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/03/12/5"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2024-2182
Vulnerability from fkie_nvd - Published: 2024-03-12 17:15 - Updated: 2024-11-21 09:09
Severity ?
Summary
A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.
References
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:1385 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:1386 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:1387 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:1388 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:1390 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:1391 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:1392 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:1393 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:1394 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:4035 | ||
| secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2024-2182 | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2267840 | ||
| secalert@redhat.com | https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html | ||
| secalert@redhat.com | https://www.openwall.com/lists/oss-security/2024/03/12/5 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2024/03/12/5 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:1385 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:1386 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:1387 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:1388 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:1390 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:1391 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:1392 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:1393 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:1394 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:4035 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/CVE-2024-2182 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=2267840 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APR4GCVCMQD3DQUKXDNGIXCCYGE5V7IT/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CB4N522FCS4XWAPUKRWZF6QZ657FCIDF/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRKXOOOKD56TY3JQVB45N3GCTX3EG4BV/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.openwall.com/lists/oss-security/2024/03/12/5 |
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una falla en la Red Virtual Abierta (OVN). En los cl\u00fasteres OVN donde se utiliza BFD entre hipervisores para alta disponibilidad, un atacante puede inyectar paquetes BFD especialmente manipulados desde cargas de trabajo sin privilegios, incluidas m\u00e1quinas virtuales o contenedores, que pueden desencadenar una denegaci\u00f3n de servicio."
}
],
"id": "CVE-2024-2182",
"lastModified": "2024-11-21T09:09:12.320",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
},
"published": "2024-03-12T17:15:59.190",
"references": [
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:1385"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:1386"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:1387"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:1388"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:1390"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:1391"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:1392"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:1393"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:1394"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:4035"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"source": "secalert@redhat.com",
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"source": "secalert@redhat.com",
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2024/03/12/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2024:1385"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2024:1386"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2024:1387"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2024:1388"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2024:1390"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2024:1391"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2024:1392"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2024:1393"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2024:1394"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2024:4035"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APR4GCVCMQD3DQUKXDNGIXCCYGE5V7IT/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CB4N522FCS4XWAPUKRWZF6QZ657FCIDF/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRKXOOOKD56TY3JQVB45N3GCTX3EG4BV/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-346"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
}
WID-SEC-W-2024-0664
Vulnerability from csaf_certbund - Published: 2024-03-19 23:00 - Updated: 2024-06-20 22:00Summary
Red Hat Enterprise Linux: Schwachstelle ermöglicht Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat Enterprise Linux (RHEL) ist eine populäre Linux-Distribution.
Angriff
Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0664 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0664.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0664 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0664"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2024-03-19",
"url": "https://access.redhat.com/errata/RHSA-2024:1385"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2024-03-19",
"url": "https://access.redhat.com/errata/RHSA-2024:1386"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2024-03-19",
"url": "https://access.redhat.com/errata/RHSA-2024:1387"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2024-03-19",
"url": "https://access.redhat.com/errata/RHSA-2024:1388"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2024-03-19",
"url": "https://access.redhat.com/errata/RHSA-2024:1390"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2024-03-19",
"url": "https://access.redhat.com/errata/RHSA-2024:1391"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2024-03-19",
"url": "https://access.redhat.com/errata/RHSA-2024:1392"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2024-03-19",
"url": "https://access.redhat.com/errata/RHSA-2024:1393"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2024-03-19",
"url": "https://access.redhat.com/errata/RHSA-2024:1394"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4035 vom 2024-06-21",
"url": "https://access.redhat.com/errata/RHSA-2024:4035"
}
],
"source_lang": "en-US",
"title": "Red Hat Enterprise Linux: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2024-06-20T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T18:06:37.550+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2024-0664",
"initial_release_date": "2024-03-19T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-03-19T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-06-20T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "8",
"product": {
"name": "Red Hat Enterprise Linux 8",
"product_id": "T014111",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-2182",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in Red Hat Enterprise Linux. Diese besteht in der Komponente OVN und ist darauf zur\u00fcckzuf\u00fchren, dass es mithilfe von manipulierten BFD Paketen m\u00f6glich ist einen Absturz zu verursachen. Ein entfernter, authentisierter Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"67646",
"T014111"
]
},
"release_date": "2024-03-19T23:00:00.000+00:00",
"title": "CVE-2024-2182"
}
]
}
GSD-2024-2182
Vulnerability from gsd - Updated: 2024-03-05 06:02Details
A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.
Aliases
{
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2024-2182"
],
"details": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.",
"id": "GSD-2024-2182",
"modified": "2024-03-05T06:02:27.299783Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2024-2182",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Fast Datapath for Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:23.06.1-112.el8fdp",
"versionType": "rpm"
}
]
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:22.12.1-94.el8fdp",
"versionType": "rpm"
}
]
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:22.03.3-71.el8fdp",
"versionType": "rpm"
}
]
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:23.03.1-100.el8fdp",
"versionType": "rpm"
}
]
}
}
]
}
},
{
"product_name": "Fast Datapath for Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:23.09.0-136.el9fdp",
"versionType": "rpm"
}
]
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:23.06.1-112.el9fdp",
"versionType": "rpm"
}
]
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:22.12.1-94.el9fdp",
"versionType": "rpm"
}
]
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:22.03.3-71.el9fdp",
"versionType": "rpm"
}
]
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:23.03.1-100.el9fdp",
"versionType": "rpm"
}
]
}
}
]
}
},
{
"product_name": "Fast Datapath for RHEL 7",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
}
]
}
},
{
"product_name": "Fast Datapath for RHEL 8",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
}
]
}
},
{
"product_name": "Fast Datapath for RHEL 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
}
]
}
},
{
"product_name": "Red Hat OpenShift Container Platform 4",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
}
]
},
"vendor_name": "Red Hat"
}
]
}
},
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Frode Nordahl (Canonical) for reporting this issue."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service."
}
]
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-346",
"lang": "eng",
"value": "Origin Validation Error"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://access.redhat.com/errata/RHSA-2024:1385",
"refsource": "MISC",
"url": "https://access.redhat.com/errata/RHSA-2024:1385"
},
{
"name": "https://access.redhat.com/errata/RHSA-2024:1386",
"refsource": "MISC",
"url": "https://access.redhat.com/errata/RHSA-2024:1386"
},
{
"name": "https://access.redhat.com/errata/RHSA-2024:1387",
"refsource": "MISC",
"url": "https://access.redhat.com/errata/RHSA-2024:1387"
},
{
"name": "https://access.redhat.com/errata/RHSA-2024:1388",
"refsource": "MISC",
"url": "https://access.redhat.com/errata/RHSA-2024:1388"
},
{
"name": "https://access.redhat.com/errata/RHSA-2024:1390",
"refsource": "MISC",
"url": "https://access.redhat.com/errata/RHSA-2024:1390"
},
{
"name": "https://access.redhat.com/errata/RHSA-2024:1391",
"refsource": "MISC",
"url": "https://access.redhat.com/errata/RHSA-2024:1391"
},
{
"name": "https://access.redhat.com/errata/RHSA-2024:1392",
"refsource": "MISC",
"url": "https://access.redhat.com/errata/RHSA-2024:1392"
},
{
"name": "https://access.redhat.com/errata/RHSA-2024:1393",
"refsource": "MISC",
"url": "https://access.redhat.com/errata/RHSA-2024:1393"
},
{
"name": "https://access.redhat.com/errata/RHSA-2024:1394",
"refsource": "MISC",
"url": "https://access.redhat.com/errata/RHSA-2024:1394"
},
{
"name": "https://access.redhat.com/security/cve/CVE-2024-2182",
"refsource": "MISC",
"url": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APR4GCVCMQD3DQUKXDNGIXCCYGE5V7IT/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APR4GCVCMQD3DQUKXDNGIXCCYGE5V7IT/"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CB4N522FCS4XWAPUKRWZF6QZ657FCIDF/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CB4N522FCS4XWAPUKRWZF6QZ657FCIDF/"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRKXOOOKD56TY3JQVB45N3GCTX3EG4BV/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRKXOOOKD56TY3JQVB45N3GCTX3EG4BV/"
},
{
"name": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html",
"refsource": "MISC",
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"name": "https://www.openwall.com/lists/oss-security/2024/03/12/5",
"refsource": "MISC",
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una falla en la Red Virtual Abierta (OVN). En los cl\u00fasteres OVN donde se utiliza BFD entre hipervisores para alta disponibilidad, un atacante puede inyectar paquetes BFD especialmente manipulados desde cargas de trabajo sin privilegios, incluidas m\u00e1quinas virtuales o contenedores, que pueden desencadenar una denegaci\u00f3n de servicio."
}
],
"id": "CVE-2024-2182",
"lastModified": "2024-03-23T03:15:12.333",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
},
"published": "2024-03-12T17:15:59.190",
"references": [
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:1385"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:1386"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:1387"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:1388"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:1390"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:1391"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:1392"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:1393"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:1394"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APR4GCVCMQD3DQUKXDNGIXCCYGE5V7IT/"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CB4N522FCS4XWAPUKRWZF6QZ657FCIDF/"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRKXOOOKD56TY3JQVB45N3GCTX3EG4BV/"
},
{
"source": "secalert@redhat.com",
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"source": "secalert@redhat.com",
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-346"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
}
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…