File _patchinfo of Package patchinfo.6197

<patchinfo incident="6197">
  <issue id="1041470" tracker="bnc">VUL-0: CVE-2017-9263: openvswitch: OpenFlow role status message can cause a call to abort()</issue>
  <issue id="1040543" tracker="bnc">VUL-0: CVE-2017-9214: openvswitch: buffer over-read when parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message</issue>
  <issue id="1041447" tracker="bnc">VUL-0: CVE-2017-9265: openvswitch: Buffer over-read while parsing the group mod OpenFlow message sent from the controller</issue>
  <issue id="1061310" tracker="bnc">VUL-0: CVE-2017-14970: openvswitch: multiple memory leaks in lib/ofp-util.c</issue>
  <issue id="2017-9265" tracker="cve" />
  <issue id="2017-9214" tracker="cve" />
  <issue id="2017-14970" tracker="cve" />
  <issue id="2017-9263" tracker="cve" />
  <category>security</category>
  <rating>moderate</rating>
  <packager>markoschandras</packager>
  <description>This update for openvswitch fixes the following issues:

* CVE-2017-9263: While parsing an OpenFlow role status message, there is a call to the abort() functio  for undefined role status reasons in the function `ofp_print_role_status_message` in `lib/ofp-print.c` that may be leveraged toward a remote DoS attack by a malicious switch. (bsc#1041470)
* CVE-2017-9265: Buffer over-read while parsing the group mod OpenFlow message sent from the controller in `lib/ofp-util.c` in the function `ofputil_pull_ofp15_group_mod`.(bsc#1041447)
* CVE-2017-9214: While parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function `ofputil_pull_queue_get_config_reply10` in `lib/ofp-util.c`. (bsc#1040543)
* CVE-2017-14970: In lib/ofp-util.c, there are multiple memory leaks while parsing malformed OpenFlow group mod messages.(bsc#1061310)

</description>
  <summary>Security update for openvswitch</summary>
</patchinfo>
openSUSE Build Service is sponsored by