it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Moritz Muehlenhoff <jmm AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5640-1] openvswitch security update
- Date: Thu, 14 Mar 2024 13:19:33 +0000
- List-archive: https://lists.debian.org/msgid-search/ZfL5ZewVcs3UQLJN AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From:Date :Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=IFaxUjfbzRBXGlltETwiw6k8L4IAlDTZNpSd20QtgVk=; b=Jx qDpTjd0NWEShayuNgK5X5aeQxKUBiVB7mVzuWjH1z2R53xplOwfLhABdVfg10JrpGrZMHSJ3A3Fj1 SCiCroVhNP+p1DFkdhtLib+N8xLHebq4cBJ7z1P8yCUwywTDqDVjWTyKvMRxAieDgGgKIrGDsIjty LmTS9+9slL4/qOPRpKazs1HWVYkkroYVasl7840JM2YGPpmlNdDkmTvVfX9qbBpQQBh/P6p5Rn42D E0DT/06TeQS1QXshluotUNWj1l5KLrl5UGJfQ+mHqYSh4WbEaFAZ2gwTOKSgwNJ7e+Kvp8+66mFSL jh8izOigYfzmVRUr3oL5sgPGBCoPkvlw==;
- Old-return-path: <jmm AT seger.debian.org>
- Priority: urgent
- Resent-date: Thu, 14 Mar 2024 13:20:02 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <Z_PaZmMwd9G.A.kxH.Cmv8lB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5640-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
March 14, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : openvswitch
CVE ID : CVE-2023-3966 CVE-2023-5366
Debian Bug : 1063492
Two vulnerabilities were discovered in Open vSwitch, a software-based
Ethernet virtual switch, which could result in a bypass of OpenFlow
rules or denial of service.
For the oldstable distribution (bullseye), these problems have been fixed
in version 2.15.0+ds1-2+deb11u5. This update also adresses a memory leak
tracked as CVE-2024-22563.
For the stable distribution (bookworm), these problems have been fixed in
version 3.1.0-2+deb12u1.
We recommend that you upgrade your openvswitch packages.
For the detailed security status of openvswitch please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openvswitch
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=ZEHS
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5640-1] openvswitch security update, Moritz Muehlenhoff, 14.03.2024
Archiv bereitgestellt durch MHonArc 2.6.19+.