File _patchinfo of Package patchinfo.6197
<patchinfo incident="6197">
<issue id="1041470" tracker="bnc">VUL-0: CVE-2017-9263: openvswitch: OpenFlow role status message can cause a call to abort()</issue>
<issue id="1040543" tracker="bnc">VUL-0: CVE-2017-9214: openvswitch: buffer over-read when parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message</issue>
<issue id="1041447" tracker="bnc">VUL-0: CVE-2017-9265: openvswitch: Buffer over-read while parsing the group mod OpenFlow message sent from the controller</issue>
<issue id="1061310" tracker="bnc">VUL-0: CVE-2017-14970: openvswitch: multiple memory leaks in lib/ofp-util.c</issue>
<issue id="2017-9265" tracker="cve" />
<issue id="2017-9214" tracker="cve" />
<issue id="2017-14970" tracker="cve" />
<issue id="2017-9263" tracker="cve" />
<category>security</category>
<rating>moderate</rating>
<packager>markoschandras</packager>
<description>This update for openvswitch fixes the following issues:
* CVE-2017-9263: While parsing an OpenFlow role status message, there is a call to the abort() functio for undefined role status reasons in the function `ofp_print_role_status_message` in `lib/ofp-print.c` that may be leveraged toward a remote DoS attack by a malicious switch. (bsc#1041470)
* CVE-2017-9265: Buffer over-read while parsing the group mod OpenFlow message sent from the controller in `lib/ofp-util.c` in the function `ofputil_pull_ofp15_group_mod`.(bsc#1041447)
* CVE-2017-9214: While parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function `ofputil_pull_queue_get_config_reply10` in `lib/ofp-util.c`. (bsc#1040543)
* CVE-2017-14970: In lib/ofp-util.c, there are multiple memory leaks while parsing malformed OpenFlow group mod messages.(bsc#1061310)
</description>
<summary>Security update for openvswitch</summary>
</patchinfo>