Control: tags -1 fixed-upstream

According to this announcment [1], CVE-2023-3966 and CVE-2023-5366 are
fixed with versions

  Latest stable:
      https://www.openvswitch.org/releases/openvswitch-3.2.2.tar.gz

  Current LTS series:
      https://www.openvswitch.org/releases/openvswitch-2.17.9.tar.gz

  Other:
      https://www.openvswitch.org/releases/openvswitch-3.1.4.tar.gz
      https://www.openvswitch.org/releases/openvswitch-3.0.6.tar.gz


[1]
https://mail.openvswitch.org/pipermail/ovs-announce/2024-February/000338.html


As sid has currently a git snapshot, it is not clear to me if that has
been fixed there too.


On Thu, 08 Feb 2024 22:35:46 +0100 Salvatore Bonaccorso
<car...@debian.org> wrote:
> Source: openvswitch
> Version: 3.3.0~git20240118.e802fe7-3
> Severity: important
> Tags: security upstream
> X-Debbugs-Cc: car...@debian.org, Debian Security Team
<t...@security.debian.org>
> Control: found -1 3.1.0-2
> 
> Hi,
> 
> The following vulnerability was published for openvswitch.
> 
> CVE-2023-3966[0]:
> | Invalid memory access in Geneve with HW offload
> 
> 
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 
> For further information see:
> 
> [0] https://security-tracker.debian.org/tracker/CVE-2023-3966
>     https://www.cve.org/CVERecord?id=CVE-2023-3966
> [1] https://www.openwall.com/lists/oss-security/2024/02/08/3
> [2]
https://mail.openvswitch.org/pipermail/ovs-dev/2024-February/411702.html
> 
> Please adjust the affected versions in the BTS as needed.
> 
> Regards,
> Salvatore
> 
> 

Reply via email to