openvswitch: CVE-2020-35498

Related Vulnerabilities: CVE-2020-35498  

Debian Bug report logs - #982493
openvswitch: CVE-2020-35498

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Wed, 10 Feb 2021 20:03:01 UTC

Severity: grave

Tags: security, upstream

Found in versions openvswitch/2.10.0+2018.08.28+git.8ca7c82b7d+ds1-12+deb10u2, openvswitch/2.10.0+2018.08.28+git.8ca7c82b7d+ds1-12, openvswitch/2.15.0~git20210104.def6eb1ea+dfsg1-4, openvswitch/2.10.6+ds1-0+deb10u1

Fixed in version openvswitch/2.15.0~git20210104.def6eb1ea+dfsg1-5

Done: Thomas Goirand <zigo@debian.org>

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, Debian OpenStack <team+openstack@tracker.debian.org>:
Bug#982493; Package src:openvswitch. (Wed, 10 Feb 2021 20:03:03 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, Debian OpenStack <team+openstack@tracker.debian.org>. (Wed, 10 Feb 2021 20:03:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: openvswitch: CVE-2020-35498
Date: Wed, 10 Feb 2021 20:59:06 +0100
Source: openvswitch
Version: 2.15.0~git20210104.def6eb1ea+dfsg1-4
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
Control: found -1 2.10.6+ds1-0+deb10u1
Control: found -1 2.10.0+2018.08.28+git.8ca7c82b7d+ds1-12+deb10u2
Control: found -1 2.10.0+2018.08.28+git.8ca7c82b7d+ds1-12

Hi,

The following vulnerability was published for openvswitch.

CVE-2020-35498[0]:
| Packet parsing vulnerability

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-35498
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35498
[1] https://www.openwall.com/lists/oss-security/2021/02/10/4

Regards,
Salvatore



Marked as found in versions openvswitch/2.10.6+ds1-0+deb10u1. Request was from Salvatore Bonaccorso <carnil@debian.org> to submit@bugs.debian.org. (Wed, 10 Feb 2021 20:03:04 GMT) (full text, mbox, link).


Marked as found in versions openvswitch/2.10.0+2018.08.28+git.8ca7c82b7d+ds1-12+deb10u2. Request was from Salvatore Bonaccorso <carnil@debian.org> to submit@bugs.debian.org. (Wed, 10 Feb 2021 20:03:04 GMT) (full text, mbox, link).


Marked as found in versions openvswitch/2.10.0+2018.08.28+git.8ca7c82b7d+ds1-12. Request was from Salvatore Bonaccorso <carnil@debian.org> to submit@bugs.debian.org. (Wed, 10 Feb 2021 20:03:05 GMT) (full text, mbox, link).


Message sent on to Salvatore Bonaccorso <carnil@debian.org>:
Bug#982493. (Wed, 10 Feb 2021 22:15:04 GMT) (full text, mbox, link).


Message #14 received at 982493-submitter@bugs.debian.org (full text, mbox, reply):

From: Thomas Goirand <zigo@debian.org>
To: 982493-submitter@bugs.debian.org
Subject: Bug#982493 marked as pending in openvswitch
Date: Wed, 10 Feb 2021 22:10:28 +0000
Control: tag -1 pending

Hello,

Bug #982493 in openvswitch reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:

https://salsa.debian.org/openstack-team/third-party/openvswitch/-/commit/e1cad68dfe3a3102c84bd59950ea43dad65653e8

------------------------------------------------------------------------
* CVE-2020-35498: Packet parsing vulnerability. Applied upstream patch:
    flow: Support extra padding length.patch (Closes: #982493).
------------------------------------------------------------------------

(this message was generated automatically)
-- 
Greetings

https://bugs.debian.org/982493



Added tag(s) pending. Request was from Thomas Goirand <zigo@debian.org> to 982493-submitter@bugs.debian.org. (Wed, 10 Feb 2021 22:15:04 GMT) (full text, mbox, link).


Reply sent to Thomas Goirand <zigo@debian.org>:
You have taken responsibility. (Wed, 10 Feb 2021 22:36:04 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Wed, 10 Feb 2021 22:36:05 GMT) (full text, mbox, link).


Message #21 received at 982493-close@bugs.debian.org (full text, mbox, reply):

From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
To: 982493-close@bugs.debian.org
Subject: Bug#982493: fixed in openvswitch 2.15.0~git20210104.def6eb1ea+dfsg1-5
Date: Wed, 10 Feb 2021 22:33:33 +0000
Source: openvswitch
Source-Version: 2.15.0~git20210104.def6eb1ea+dfsg1-5
Done: Thomas Goirand <zigo@debian.org>

We believe that the bug you reported is fixed in the latest version of
openvswitch, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 982493@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thomas Goirand <zigo@debian.org> (supplier of updated openvswitch package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Wed, 10 Feb 2021 22:59:35 +0100
Source: openvswitch
Architecture: source
Version: 2.15.0~git20210104.def6eb1ea+dfsg1-5
Distribution: unstable
Urgency: high
Maintainer: Debian OpenStack <team+openstack@tracker.debian.org>
Changed-By: Thomas Goirand <zigo@debian.org>
Closes: 982493
Changes:
 openvswitch (2.15.0~git20210104.def6eb1ea+dfsg1-5) unstable; urgency=high
 .
   * CVE-2020-35498: Packet parsing vulnerability. Applied upstream patch:
     flow: Support extra padding length.patch (Closes: #982493).
Checksums-Sha1:
 0dd8d36345cdffd06b6980875e86b157ada9e9d1 3316 openvswitch_2.15.0~git20210104.def6eb1ea+dfsg1-5.dsc
 b0436e44a21263978d875af871a5deb18632fa1f 53420 openvswitch_2.15.0~git20210104.def6eb1ea+dfsg1-5.debian.tar.xz
 6a7dbfac78d66690e2a4e2052bb0a15e424297c3 20160 openvswitch_2.15.0~git20210104.def6eb1ea+dfsg1-5_amd64.buildinfo
Checksums-Sha256:
 6575999f2951f0886aab18b5820f3a03154c4d507b5454f9017102259b4381c1 3316 openvswitch_2.15.0~git20210104.def6eb1ea+dfsg1-5.dsc
 595a16f940134d9d9068d3d98d63170c5dc300ca0912473169ec3193291fad4b 53420 openvswitch_2.15.0~git20210104.def6eb1ea+dfsg1-5.debian.tar.xz
 9eaa124c1eb1edf519c25726711774c6fc545fc262869976d34b6be9d97b7b6b 20160 openvswitch_2.15.0~git20210104.def6eb1ea+dfsg1-5_amd64.buildinfo
Files:
 41deb3766fd506d15b72d0d5c2ea64c2 3316 net optional openvswitch_2.15.0~git20210104.def6eb1ea+dfsg1-5.dsc
 09dcd7b6fa76de2bd785e20b73059185 53420 net optional openvswitch_2.15.0~git20210104.def6eb1ea+dfsg1-5.debian.tar.xz
 785149532fb8be4bd88ff307a2a7068d 20160 net optional openvswitch_2.15.0~git20210104.def6eb1ea+dfsg1-5_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=PsKe
-----END PGP SIGNATURE-----




Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Thu Feb 11 08:02:15 2021; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.