{"uuid": "8724da52-fe8d-41ac-ae45-5fb266d79cf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5366", "type": "seen", "source": "https://t.me/MrVGunz/1205", "content": "\ud83d\udccd\u0627\u0637\u0644\u0627\u0639\u06cc\u0647 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0636\u0639\u0641 \u062f\u0631 Open vSwitch: \u0631\u0627\u0647\u06a9\u0627\u0631 \u0627\u0631\u062a\u0642\u0627\u0621 \u0627\u0645\u0646\u06cc\u062a\n\n\u062f\u0631 19 \u0641\u0648\u0631\u06cc\u0647 2024\u060c \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u062c\u062f\u06cc\u062f\u06cc \u0628\u0631\u0627\u06cc \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631 Open vSwitch \u0645\u0646\u062a\u0634\u0631 \u0634\u062f \u06a9\u0647 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc CVE-2023-5366 \u0631\u0627 \u0628\u0631\u0637\u0631\u0641 \u0645\u06cc\u200c\u06a9\u0646\u062f. \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0627\u062c\u0627\u0632\u0647 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u0642\u0648\u0627\u0646\u06cc\u0646 OpenFlow \u0631\u0627 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0628\u0633\u062a\u0647\u200c\u0647\u0627\u06cc ICMPv6 Neighbor Advertisement \u0645\u063a\u0634\u0648\u0634 \u062f\u0647\u062f. \u0627\u06cc\u0646 \u0645\u0634\u06a9\u0644 \u062f\u0631 \u0646\u0633\u062e\u0647 Debian 10 (Buster) \u0628\u0627 \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0628\u0647 \u0646\u0633\u062e\u0647 2.10.7+ds1-0+deb10u5 \u0631\u0641\u0639 \u0634\u062f\u0647 \u0627\u0633\u062a. \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u0628\u0627\u06cc\u062f \u0628\u0647\u200c\u0633\u0631\u0639\u062a \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631 \u062e\u0648\u062f \u0631\u0627 \u0628\u0647 \u0627\u06cc\u0646 \u0646\u0633\u062e\u0647 \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u06a9\u0646\u0646\u062f.\n\n\ud83d\udd17 \u062c\u0647\u062a \u0645\u0637\u0627\u0644\u0639\u0647 \u0627\u062f\u0627\u0645\u0647 \u0645\u0642\u0627\u0644\u0647: \u0644\u06cc\u0646\u06a9\n\n\ud83d\udccd Security Advisory on Open vSwitch Vulnerability: Security Upgrade Solution\n\nOn February 19, 2024, a new update for the Open vSwitch software was released to address the vulnerability CVE-2023-5366. This vulnerability allows access to OpenFlow rules through spoofed ICMPv6 Neighbor Advertisement packets. It has been resolved in Debian 10 (Buster) with the update to version 2.10.7+ds1-0+deb10u5. Users are strongly advised to promptly update their software to this version.\n\n\ud83d\udd17 For more information, please visit: Link", "creation_timestamp": "2024-07-16T10:21:10.000000Z"}