-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-3253-1 debian-...@lists.debian.org https://www.debian.org/lts/security/ Chris Lamb December 31, 2022 https://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : openvswitch Version : 2.10.7+ds1-0+deb10u3 CVE IDs : CVE-2022-4337 CVE-2022-4338 Debian Bug : 1027273 It was discovered that there was an out-of-bounds read and integer underflow vulnerability in open vSwitch, a software-based Ethernet virtual switch. For Debian 10 buster, these problems have been fixed in version 2.10.7+ds1-0+deb10u3. We recommend that you upgrade your openvswitch packages. For the detailed security status of openvswitch please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openvswitch Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEwv5L0nHBObhsUz5GHpU+J9QxHlgFAmOwHEYACgkQHpU+J9Qx HlhHFxAAhUeLGYWet8OKB+DdTuwAv8Vh3WHqduvwP3cbmXTgV5DXJ2Z/W7Z6AtsA Q419RsgpqPYLZ3YKK22UaC5EbzqMQPbnGHhbNkyj4I6KhM07yFNiayPm3aSmm54f 3lXtm1fQDpxo8tXcupoXBmEc1HmSyw8K23bVaLj61WGW70Y/J2EyJCbHh+ZG/pxN 5xJEqzkFZ7L6QyNN8osz5lMGygnRmoKTxPv/7ydF908NpreuL5PFdvR2cWnowesA 8DIcYHOjBQ9GTebL3lVxJXn/38hffQwSbJl/CgUWWCxc5Svfa663t9qWVlxGphn9 xHkZttHqMNu8psao2ZkmQJ+QgvoiZ5xzFxb03eLz+UZ6SpUBpHV3P79CWxUce4G2 6kJHEjNjzJyRTDSIsHr9s5/Vubc3DX9Ip/lpsLok2JxLQgt+32uWYRuXxoU6Ktxi DcG9ue44OzfufJpZwne+lBC5++/skYbjISpP3MUA7LENCbkdl5UOkIo5FcJbyQKF qjXbchE0qtI3FAm8Jooyqz2kpKsIjz5FpE+DVYZuQSv7316Tty7xEc3+u6oKSEoH CbwNbL7R/KXPFxPM348RrEnpUP8xW3vNGqplypbrJo1BY9ZNTj4gvFBOhgCEihxq Spx9Rw9SevyjOHr4GZVF22xYDxyiwWDuy+v57wm8kcw6MiPiTI4= =khI1 -----END PGP SIGNATURE-----