File _patchinfo of Package patchinfo.42368
<patchinfo incident="42368"> <issue tracker="cve" id="2023-3153"/> <issue tracker="cve" id="2023-3152"/> <issue tracker="cve" id="2023-5366"/> <issue tracker="cve" id="2023-3966"/> <issue tracker="cve" id="2024-2182"/> <issue tracker="cve" id="2025-0650"/> <issue tracker="cve" id="2023-1668"/> <issue tracker="bnc" id="1210054">VUL-0: CVE-2023-1668: openvswitch: remote traffic denial of service via crafted packets with IP proto 0</issue> <issue tracker="bnc" id="1219465">VUL-0: CVE-2023-3966: openvswitch, openvswitch3: Invalid memory access in Geneve with HW offload</issue> <issue tracker="bnc" id="1255435">VUL-0: CVE-2024-2182: openvswitch: ov: insufficient validation of incoming BFD packets may lead to denial of service</issue> <issue tracker="bnc" id="1212125">VUL-0: CVE-2023-3153: openvswitch,openvswitch3: service monitor MAC flow is not rate limited</issue> <issue tracker="bnc" id="1216002">VUL-0: CVE-2023-5366: openvswitch: missing masks on a final stage with ports trie</issue> <packager>cfconrad</packager> <rating>important</rating> <category>security</category> <summary>Security update for openvswitch3</summary> <description>This update for openvswitch3 fixes the following issues: Update to v3.1.7: - CVE-2023-3966: openvswitch, openvswitch3: Invalid memory access in Geneve with HW offload (bsc#1219465). - CVE-2024-2182: openvswitch: ov: insufficient validation of incoming BFD packets may lead to denial of service (bsc#1255435). - CVE-2023-1668: openvswitch: remote traffic denial of service via crafted packets with IP proto 0 (bsc#1210054). - CVE-2023-3153: openvswitch,openvswitch3: service monitor MAC flow is not rate limited (bsc#1212125). - CVE-2023-5366: openvswitch: missing masks on a final stage with ports trie (bsc#1216002). </description> </patchinfo>