SUSE alert SUSE-SU-2021:0276-1 (openvswitch)
From: | sle-security-updates@lists.suse.com | |
To: | sle-security-updates@lists.suse.com | |
Subject: | SUSE-SU-2021:0276-1: important: Security update for openvswitch | |
Date: | Tue, 02 Feb 2021 12:18:34 +0100 | |
Message-ID: | <20210202111834.5C873FF1F@maintenance.suse.de> |
SUSE Security Update: Security update for openvswitch ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:0276-1 Rating: important References: #1181345 Cross-References: CVE-2020-27827 Affected Products: SUSE Linux Enterprise Server 12-SP5 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for openvswitch fixes the following issues: - openvswitch was updated to 2.11.5 - CVE-2020-27827: Fixed a memory leak when parsing lldp packets (bsc#1181345) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-276=1 Package List: - SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64): libopenvswitch-2_11-0-2.11.5-3.3.2 libopenvswitch-2_11-0-debuginfo-2.11.5-3.3.2 openvswitch-2.11.5-3.3.2 openvswitch-debuginfo-2.11.5-3.3.2 openvswitch-debugsource-2.11.5-3.3.2 References: https://www.suse.com/security/cve/CVE-2020-27827.html https://bugzilla.suse.com/1181345