Your message dated Wed, 19 Apr 2023 16:47:10 +0000
with message-id <e1ppaxa-000gdv...@fasolo.debian.org>
and subject line Bug#1034042: fixed in openvswitch 2.15.0+ds1-2+deb11u4
has caused the Debian Bug report #1034042,
regarding openvswitch: CVE-2023-1668: Remote traffic denial of service via 
crafted packets with IP proto 0
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1034042: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034042
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: openvswitch
Version: 3.1.0-1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for openvswitch.

CVE-2023-1668[0]:
| Remote traffic denial of service via crafted packets with IP proto 0

Thomas and Luca, can you make sure the fix lands in bookworm via a
unblock request. For bullseye I'm not yet sure if we need a DSA or we
can go the near bullseye point release. 

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-1668
    https://www.cve.org/CVERecord?id=CVE-2023-1668
[1] https://www.openwall.com/lists/oss-security/2023/04/06/1

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: openvswitch
Source-Version: 2.15.0+ds1-2+deb11u4
Done: Thomas Goirand <z...@debian.org>

We believe that the bug you reported is fixed in the latest version of
openvswitch, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1034...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thomas Goirand <z...@debian.org> (supplier of updated openvswitch package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 11 Apr 2023 10:08:09 +0200
Source: openvswitch
Architecture: source
Version: 2.15.0+ds1-2+deb11u4
Distribution: bullseye-security
Urgency: medium
Maintainer: Debian OpenStack <team+openst...@tracker.debian.org>
Changed-By: Thomas Goirand <z...@debian.org>
Closes: 1034042
Changes:
 openvswitch (2.15.0+ds1-2+deb11u4) bullseye-security; urgency=medium
 .
   * CVE-2023-1668: Remote traffic denial of service via crafted packets with IP
     proto 0. Applied upstream patch: ofproto-dpif-xlate: Always mask ip proto
     field (Closes: #1034042).
Checksums-Sha1:
 e93b4dbc0affd38a4138b637be7f9a0479af6529 3180 
openvswitch_2.15.0+ds1-2+deb11u4.dsc
 23e1e6493c66a7af4b454c473c34f1ed5de4b9cf 3721240 
openvswitch_2.15.0+ds1.orig.tar.xz
 225fff814fbf2b7b7a1268b0b096de5ebb8f68a0 59496 
openvswitch_2.15.0+ds1-2+deb11u4.debian.tar.xz
 26a1888cb2d85deea999d6248d81724cb92be1e2 21978 
openvswitch_2.15.0+ds1-2+deb11u4_amd64.buildinfo
Checksums-Sha256:
 09d16904195d375b2de69aa5da0e36781eb86c23b5256fc4b578d1a8100333d3 3180 
openvswitch_2.15.0+ds1-2+deb11u4.dsc
 801aeb7e4135f20ebb965df47527ce1118da25ac143a975113f4f0d2c7be62ab 3721240 
openvswitch_2.15.0+ds1.orig.tar.xz
 d7eff6bed8ae1205ec8941b5350353d5defb4cd0f82eb07070ecdfda8e7cae45 59496 
openvswitch_2.15.0+ds1-2+deb11u4.debian.tar.xz
 efd4fefdfd1ac8889b5fee0e5d0b757d98f9abc78aa4e40b29d5e580104caac4 21978 
openvswitch_2.15.0+ds1-2+deb11u4_amd64.buildinfo
Files:
 8bf344c39855985a9b99809073deff44 3180 net optional 
openvswitch_2.15.0+ds1-2+deb11u4.dsc
 534a718be0dac829f71f02bc4e89fe1f 3721240 net optional 
openvswitch_2.15.0+ds1.orig.tar.xz
 df8f0ecacb865905e995255d5046074e 59496 net optional 
openvswitch_2.15.0+ds1-2+deb11u4.debian.tar.xz
 2e4437d292fce35ce60015c5aad02b91 21978 net optional 
openvswitch_2.15.0+ds1-2+deb11u4_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=PCr3
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to