{"affected":[{"ecosystem_specific":{"binaries":[{"libopenvswitch-3_1-0":"3.1.7-150600.33.9.1","libovn-23_03-0":"23.03.3-150600.33.9.1","openvswitch":"3.1.7-150600.33.9.1","openvswitch-devel":"3.1.7-150600.33.9.1","openvswitch-ipsec":"3.1.7-150600.33.9.1","openvswitch-pki":"3.1.7-150600.33.9.1","openvswitch-test":"3.1.7-150600.33.9.1","openvswitch-vtep":"3.1.7-150600.33.9.1","ovn":"23.03.3-150600.33.9.1","ovn-central":"23.03.3-150600.33.9.1","ovn-devel":"23.03.3-150600.33.9.1","ovn-docker":"23.03.3-150600.33.9.1","ovn-host":"23.03.3-150600.33.9.1","ovn-vtep":"23.03.3-150600.33.9.1","python3-ovs":"3.1.7-150600.33.9.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP6-LTSS","name":"openvswitch","purl":"pkg:rpm/suse/openvswitch&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP6-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.1.7-150600.33.9.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libopenvswitch-3_1-0":"3.1.7-150600.33.9.1","libovn-23_03-0":"23.03.3-150600.33.9.1","openvswitch":"3.1.7-150600.33.9.1","openvswitch-devel":"3.1.7-150600.33.9.1","openvswitch-ipsec":"3.1.7-150600.33.9.1","openvswitch-pki":"3.1.7-150600.33.9.1","openvswitch-test":"3.1.7-150600.33.9.1","openvswitch-vtep":"3.1.7-150600.33.9.1","ovn":"23.03.3-150600.33.9.1","ovn-central":"23.03.3-150600.33.9.1","ovn-devel":"23.03.3-150600.33.9.1","ovn-docker":"23.03.3-150600.33.9.1","ovn-host":"23.03.3-150600.33.9.1","ovn-vtep":"23.03.3-150600.33.9.1","python3-ovs":"3.1.7-150600.33.9.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP6","name":"openvswitch","purl":"pkg:rpm/suse/openvswitch&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.1.7-150600.33.9.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libopenvswitch-3_1-0":"3.1.7-150600.33.9.1","libovn-23_03-0":"23.03.3-150600.33.9.1","openvswitch":"3.1.7-150600.33.9.1","openvswitch-devel":"3.1.7-150600.33.9.1","openvswitch-doc":"3.1.7-150600.33.9.1","openvswitch-ipsec":"3.1.7-150600.33.9.1","openvswitch-pki":"3.1.7-150600.33.9.1","openvswitch-test":"3.1.7-150600.33.9.1","openvswitch-vtep":"3.1.7-150600.33.9.1","ovn":"23.03.3-150600.33.9.1","ovn-central":"23.03.3-150600.33.9.1","ovn-devel":"23.03.3-150600.33.9.1","ovn-doc":"23.03.3-150600.33.9.1","ovn-docker":"23.03.3-150600.33.9.1","ovn-host":"23.03.3-150600.33.9.1","ovn-vtep":"23.03.3-150600.33.9.1","python3-ovs":"3.1.7-150600.33.9.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"openvswitch","purl":"pkg:rpm/opensuse/openvswitch&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.1.7-150600.33.9.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for openvswitch fixes the following issues:\n\nUpdate to v3.1.7:\n\n - CVE-2023-3966: openvswitch, openvswitch3: Invalid memory access in Geneve with HW offload (bsc#1219465).\n - CVE-2024-2182: openvswitch: ov: insufficient validation of incoming BFD packets may lead to denial of service (bsc#1255435).\n - CVE-2023-1668: openvswitch: remote traffic denial of service via crafted packets with IP proto 0 (bsc#1210054).\n - CVE-2023-3153: openvswitch,openvswitch3: service monitor MAC flow is not rate limited (bsc#1212125).\n - CVE-2023-5366: openvswitch: missing masks on a final stage with ports trie (bsc#1216002).\n","id":"SUSE-SU-2026:0280-1","modified":"2026-01-23T15:33:56Z","published":"2026-01-23T15:33:56Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-20260280-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1210054"},{"type":"REPORT","url":"https://bugzilla.suse.com/1212125"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216002"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219465"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255435"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-1668"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-3152"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-3153"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-3966"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-5366"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-2182"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-0650"}],"related":["CVE-2023-1668","CVE-2023-3152","CVE-2023-3153","CVE-2023-3966","CVE-2023-5366","CVE-2024-2182","CVE-2025-0650"],"summary":"Security update for openvswitch","upstream":["CVE-2023-1668","CVE-2023-3152","CVE-2023-3153","CVE-2023-3966","CVE-2023-5366","CVE-2024-2182","CVE-2025-0650"]}