Ubuntu alert USN-4729-1 (openvswitch)
| From: | Marc Deslauriers <marc.deslauriers@canonical.com> | |
| To: | "ubuntu-security-announce@lists.ubuntu.com" <ubuntu-security-announce@lists.ubuntu.com> | |
| Subject: | [USN-4729-1] Open vSwitch vulnerability | |
| Date: | Wed, 10 Feb 2021 11:21:57 -0500 | |
| Message-ID: | <eac0d286-0430-5dc4-6d26-6d3d40490d98@canonical.com> |
========================================================================== Ubuntu Security Notice USN-4729-1 February 10, 2021 openvswitch vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.10 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: Open vSwitch could be made to crash or perform unexpectedly if it received specially crafted network traffic. Software Description: - openvswitch: Ethernet virtual switch Details: Joakim Hindersson discovered that Open vSwitch incorrectly parsed certain network packets. A remote attacker could use this issue to cause a denial of service, or possibly alter packet classification. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.10: openvswitch-common 2.13.1-0ubuntu1.3 Ubuntu 20.04 LTS: openvswitch-common 2.13.1-0ubuntu0.20.04.4 Ubuntu 18.04 LTS: openvswitch-common 2.9.8-0ubuntu0.18.04.2 Ubuntu 16.04 LTS: openvswitch-common 2.5.9-0ubuntu0.16.04.3 In general, a standard system update will make all the necessary changes. References: https://usn.ubuntu.com/4729-1 CVE-2020-35498 Package Information: https://launchpad.net/ubuntu/+source/openvswitch/2.13.1-0... https://launchpad.net/ubuntu/+source/openvswitch/2.13.1-0... https://launchpad.net/ubuntu/+source/openvswitch/2.9.8-0u... https://launchpad.net/ubuntu/+source/openvswitch/2.5.9-0u... -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...
