it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Moritz Muehlenhoff <jmm AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 4836-1] openvswitch security update
- Date: Fri, 22 Jan 2021 18:52:14 +0000
- List-archive: https://lists.debian.org/msgid-search/20210122185214.GC909 AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From: Date:Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=OXBvo3sliD32DJDrsdlffpfySz+qMWnQLnaMu9/wrCI=; b=Fz M2CvxvjNvs7gBVOAr9yHwGLjDAmfKHs64U3vCDF5c4DbLN1mhg19H/R0SsQgDHhGPG+KTquURGtWI vFlAUvRlB7FeLZchhPJtMAR+b2bCsOvgfCnHtMnU9f1n2iEdC3+6aEPPcHq/YmuV/vVyt93b3HBu8 Zpiu7GMIsTVgsRppWm94F02R3bs2yQJREIyJGOES0tD0h+87Ee6WnnPI1fV7Zsutt1uU7n26NcBmy AC9aPXKKGm88s7nDpwPR198g4i75fg1Et/7dCa6MUI38w+Q/EPMvJJAl7hoRUNsYeTnX5vfU8/t90 Xkdat/1mgUHdgWefm/m4GN4ziCkGSgmg==;
- Old-return-path: <jmm AT seger.debian.org>
- Priority: urgent
- Resent-date: Fri, 22 Jan 2021 18:52:36 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <bJw_ItrHWg.A.IoG.07xCgB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4836-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
January 22, 2021 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : openvswitch
CVE ID : CVE-2015-8011 CVE-2020-27827
Debian Bug : 980132
Two vulnerabilities were discovered in the LLPD implementation of Open
vSwitch, a software-based Ethernet virtual switch, which could result in
denial of service.
For the stable distribution (buster), these problems have been fixed in
version 2.10.6+ds1-0+deb10u1.
We recommend that you upgrade your openvswitch packages.
For the detailed security status of openvswitch please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openvswitch
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmALHj0ACgkQEMKTtsN8
TjaYHw/6Atkb8+AS+g8R3FpNe0L+Eqie3RzZ1ZOhbJTvkBzeKdusw4dNk7DfsbJt
uy/b2hHvooR+MQVpxeDXD/Azpf+k7b1m3LZ7P/fKKsXDmuMX6jge8rai8DZyJdfI
IRYjU+yqd6z9ytKRg8bPcXgG/1hmdMznunBdpdLKQnmtH2EsVrflAaqAkABqVjO6
X0NHzUsRrI0yXWLDI3pqD7bc8Oq/TFtHi6BCBVxk3VPegBC3CzAelPfHu5KJeSKC
lOyrmc+ut/HbXJexRFzkrrNQsYB2M7/ZgJLv0XQmYaP7vnpu09xaaqYBreCIp8Q9
DZmCy9pLVzop0WNJzdLnRbwhBB2eBZF6qyax6ldvifcN/QAnLLC4Zzg1eNdktrPE
Dq9rJ/6U56DycmqKrlyKvlpTHM0IJ4+4TI5yM4OL2/wDkT/Mfjr7lwQbo/Xafy/X
+vviNQGFd2z/8aIdkc0auPhGle/VME+mlBBLCNU47HrfaWTIR94PFjKfmTL/9dzM
VRz6TfS5yG9kCi9H1xB/94q50no186IVUh5+Jr7SnfCr0sSm5ahNIIEtg5lmvqHd
pUDZD7tO0uvcMUIV06xXSealz1ECKzwB0ZaJYfngOZ/KnBr7opZsDXm0wRVZdSBN
DFZQX3XNSM1Gi0xHlV6uYQgi2HRuPk5QdW2TqmEN7XUNeQ9xdpI=
=BZCg
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 4836-1] openvswitch security update, Moritz Muehlenhoff, 22.01.2021
Archiv bereitgestellt durch MHonArc 2.6.24.