This bug was fixed in the package openvswitch - 2.6.1-0ubuntu0.16.10.2~cloud0
---------------
openvswitch (2.6.1-0ubuntu0.16.10.2~cloud0) xenial; urgency=medium
.
* SECURITY UPDATE: DoS while parsing OFPT_QUEUE_GET_CONFIG_REPLY message
- debian/patches/CVE-2017-9214.patch: properly check length in lib/ofp-util.c.
- CVE-2017-9214
* SECURITY UPDATE: DoS while parsing OpenFlow role status message
- debian/patches/CVE-2017-9263.patch: don't abort on unknown reason in lib/ofp-print.c.
- CVE-2017-9263
* SECURITY UPDATE: DoS in firewall implementation
- debian/patches/CVE-2017-9264.patch: fix checks for header sizes in lib/conntrack.c.
- CVE-2017-9264
* SECURITY UPDATE: DoS while parsing group mod OpenFlow message
- debian/patches/CVE-2017-9265.patch: check length in lib/ofp-util.c.
- CVE-2017-9265
* d/openvswitch-switch.postinst: Do not modify
/etc/default/openvswitch-switch as this file is now managed
as a configuration file by dpkg (LP: #1723480).
This bug was fixed in the package openvswitch - 2.6.1-0ubuntu0. 16.10.2~ cloud0
---------------
openvswitch (2.6.1- 0ubuntu0. 16.10.2~ cloud0) xenial; urgency=medium GET_CONFIG_ REPLY message patches/ CVE-2017- 9214.patch: properly check length in
lib/ofp- util.c. patches/ CVE-2017- 9263.patch: don't abort on unknown reason in
lib/ofp- print.c. patches/ CVE-2017- 9264.patch: fix checks for header sizes in
lib/conntrack. c. patches/ CVE-2017- 9265.patch: check length in lib/ofp-util.c. switch. postinst: Do not modify default/ openvswitch- switch as this file is now managed
.
* SECURITY UPDATE: DoS while parsing OFPT_QUEUE_
- debian/
- CVE-2017-9214
* SECURITY UPDATE: DoS while parsing OpenFlow role status message
- debian/
- CVE-2017-9263
* SECURITY UPDATE: DoS in firewall implementation
- debian/
- CVE-2017-9264
* SECURITY UPDATE: DoS while parsing group mod OpenFlow message
- debian/
- CVE-2017-9265
* d/openvswitch-
/etc/
as a configuration file by dpkg (LP: #1723480).