<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for openvswitch</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2026:20049-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2026-01-09T10:54:58Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2026-01-09T10:54:58Z</InitialReleaseDate>
    <CurrentReleaseDate>2026-01-09T10:54:58Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for openvswitch</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for openvswitch fixes the following issues:

Update OpenvSwitch to v3.1.7 and OVN to v23.03.3.

Security issues fixed:

- CVE-2023-3966: ovs: invalid memory access and potential denial of service via specially crafted Geneve packets
  (bsc#1219465).
- CVE-2023-5366: ovs: OpenFlow rules may be bypassed via specially crafted ICMPv6 Neighbor Advertisement packets sent
  between virtual machines t(bsc#1216002).
- CVE-2024-2182: ovn: denial of service via injection of specially crafted BFD packets from inside unprivileged
  workloads (bsc#1255435).
- CVE-2025-0650: ovn: egress ACLs may be bypassed via specially crafted UDP packet (bsc#1236353).

Other updates and bugfixes:

- OpenvSwitch:
  * https://www.openvswitch.org/releases/NEWS-3.1.7.txt
  * v3.1.7
    - Bug fixes
    - OVS validated with DPDK 22.11.7.
  * v3.1.6
    - Bug fixes
    - OVS validated with DPDK 22.11.6.
  * v3.1.5
    - Bug fixes
    - OVS validated with DPDK 22.11.5.
  * v3.1.4
    - Bug fixes
    - OVS validated with DPDK 22.11.4.
- OVN:
  * https://github.com/ovn-org/ovn/blob/branch-23.03/NEWS
  * v23.03.3
    - Bug fixes
    - Add "garp-max-timeout-sec" config option to vswitchd external-ids to cap the time between when ovn-controller
      sends gARP packets.
  * v23.03.1
    - Bug fixes
    - CT entries are not flushed by default anymore whenever a load balancer backend is removed. A new, per-LB, option
      'ct_flush' can be used to restore the previous behavior. Disabled by default.
    - Always allow IPv6 Router Discovery, Neighbor Discovery, and Multicast Listener Discovery protocols, regardless of
      ACLs defined.
    - Send ICMP Fragmentation Needed packets back to offending ports when communicating with multichassis ports using
      frames that don't fit through a tunnel. This is done only for logical switches that are attached to a physical
      network via a localnet port, in which case multichassis ports may have an effective MTU different from regular
      ports and hence may need this mechanism to maintain connectivity with other peers in the network.
    - ECMP routes use L4_SYM dp-hash by default if the datapath supports it. Existing sessions might get re-hashed to a
      different ECMP path when OVN detects the algorithm support in the datapath during an upgrade or restart of
      ovn-controller.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-Micro-6.0-554</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620049-1/</URL>
      <Description>Link for SUSE-SU-2026:20049-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2026-January/023759.html</URL>
      <Description>E-Mail link for SUSE-SU-2026:20049-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1216002</URL>
      <Description>SUSE Bug 1216002</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1219465</URL>
      <Description>SUSE Bug 1219465</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1236353</URL>
      <Description>SUSE Bug 1236353</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1255435</URL>
      <Description>SUSE Bug 1255435</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-3966/</URL>
      <Description>SUSE CVE CVE-2023-3966 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-5366/</URL>
      <Description>SUSE CVE CVE-2023-5366 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-2182/</URL>
      <Description>SUSE CVE CVE-2024-2182 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-0650/</URL>
      <Description>SUSE CVE CVE-2025-0650 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Micro 6.0">
      <Branch Type="Product Name" Name="SUSE Linux Micro 6.0">
        <FullProductName ProductID="SUSE Linux Micro 6.0" CPE="cpe:/o:suse:sl-micro:6.0">SUSE Linux Micro 6.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libopenvswitch-3_1-0-3.1.7-4.1">
      <FullProductName ProductID="libopenvswitch-3_1-0-3.1.7-4.1">libopenvswitch-3_1-0-3.1.7-4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openvswitch-3.1.7-4.1">
      <FullProductName ProductID="openvswitch-3.1.7-4.1">openvswitch-3.1.7-4.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libopenvswitch-3_1-0-3.1.7-4.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:libopenvswitch-3_1-0-3.1.7-4.1">libopenvswitch-3_1-0-3.1.7-4.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="openvswitch-3.1.7-4.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:openvswitch-3.1.7-4.1">openvswitch-3.1.7-4.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in Open vSwitch where multiple versions are vulnerable to crafted Geneve packets, which may result in a denial of service and invalid memory accesses. Triggering this issue requires that hardware offloading via the netlink path is enabled.</Note>
    </Notes>
    <CVE>CVE-2023-3966</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:libopenvswitch-3_1-0-3.1.7-4.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:openvswitch-3.1.7-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620049-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-3966.html</URL>
        <Description>CVE-2023-3966</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1219465</URL>
        <Description>SUSE Bug 1219465</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.</Note>
    </Notes>
    <CVE>CVE-2023-5366</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:libopenvswitch-3_1-0-3.1.7-4.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:openvswitch-3.1.7-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620049-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-5366.html</URL>
        <Description>CVE-2023-5366</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1216002</URL>
        <Description>SUSE Bug 1216002</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.</Note>
    </Notes>
    <CVE>CVE-2024-2182</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:libopenvswitch-3_1-0-3.1.7-4.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:openvswitch-3.1.7-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620049-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-2182.html</URL>
        <Description>CVE-2024-2182</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1255435</URL>
        <Description>SUSE Bug 1255435</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Open Virtual Network (OVN). Specially crafted UDP packets may bypass egress access control lists (ACLs) in OVN installations configured with a logical switch with DNS records set on it and if the same switch has any egress ACLs configured. This issue can lead to unauthorized access to virtual machines and containers running on the OVN network.</Note>
    </Notes>
    <CVE>CVE-2025-0650</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:libopenvswitch-3_1-0-3.1.7-4.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:openvswitch-3.1.7-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620049-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-0650.html</URL>
        <Description>CVE-2025-0650</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1236353</URL>
        <Description>SUSE Bug 1236353</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
