Your message dated Mon, 17 Apr 2023 07:04:04 +0000
with message-id <[email protected]>
and subject line Bug#1034042: fixed in openvswitch 3.1.0-2
has caused the Debian Bug report #1034042,
regarding openvswitch: CVE-2023-1668: Remote traffic denial of service via 
crafted packets with IP proto 0
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1034042: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034042
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: openvswitch
Version: 3.1.0-1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for openvswitch.

CVE-2023-1668[0]:
| Remote traffic denial of service via crafted packets with IP proto 0

Thomas and Luca, can you make sure the fix lands in bookworm via a
unblock request. For bullseye I'm not yet sure if we need a DSA or we
can go the near bullseye point release. 

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-1668
    https://www.cve.org/CVERecord?id=CVE-2023-1668
[1] https://www.openwall.com/lists/oss-security/2023/04/06/1

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: openvswitch
Source-Version: 3.1.0-2
Done: Thomas Goirand <[email protected]>

We believe that the bug you reported is fixed in the latest version of
openvswitch, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thomas Goirand <[email protected]> (supplier of updated openvswitch package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 11 Apr 2023 11:54:40 +0200
Source: openvswitch
Architecture: source
Version: 3.1.0-2
Distribution: unstable
Urgency: high
Maintainer: Debian OpenStack <[email protected]>
Changed-By: Thomas Goirand <[email protected]>
Closes: 1034042
Changes:
 openvswitch (3.1.0-2) unstable; urgency=high
 .
   * CVE-2023-1668: Remote traffic denial of service via crafted packets with IP
     proto 0. Applied upstream patch: ofproto-dpif-xlate: Always mask ip proto
     field (Closes: #1034042).
Checksums-Sha1:
 a2c9226a41fdddfb93f652ddd29cbb772cfe8312 3527 openvswitch_3.1.0-2.dsc
 31ee0ac2873d9a3abd8a782ff3ed8996faa0235b 69756 
openvswitch_3.1.0-2.debian.tar.xz
 6621e5d66e7078b329d67823443d47bc7e25fafe 23053 
openvswitch_3.1.0-2_amd64.buildinfo
Checksums-Sha256:
 3dd8d5d1ae3f1a9a220cbff1d1171efc8a78e3523446231228e28b0445932a2e 3527 
openvswitch_3.1.0-2.dsc
 8c776c7cf9489900ea50cec431b58d37fdd88fd25a71466c2baff4646df7aec7 69756 
openvswitch_3.1.0-2.debian.tar.xz
 6f45b0452bc357d621366f5154ac7b06b8985089b8a3cf078e7b66d619b5356f 23053 
openvswitch_3.1.0-2_amd64.buildinfo
Files:
 717fe1e3f60c824ec9fe77bcff899ffd 3527 net optional openvswitch_3.1.0-2.dsc
 069ab4dfbe27a588932f61255d38f59e 69756 net optional 
openvswitch_3.1.0-2.debian.tar.xz
 75bc1eb36dd36a9431b0b2fed379af4e 23053 net optional 
openvswitch_3.1.0-2_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=NUU0
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to