"Multiple versions of Open vSwitch are vulnerable to crafted LLDP packets causing denial of service, and data underflow attacks. Triggering the vulnerabilities requires LLDP processing to be enabled for a specific port. Open vSwitch versions prior to 2.4.0 are not vulnerable. The Common Vulnerabilities and Exposures project (cve.mitre.org) did not assign the identifier to this issue yet. The identifier will be communicated separately. This issue does not affect the `lldpd' project, although they share a code base. The issue is related to parsing the Auto Attach TLVs, which is specific to the Open vSwitch implementation." Please bump to 2.15.7, 2.17.5.
CVE-2023-1668 (https://bugzilla.redhat.com/show_bug.cgi?id=2137666): https://www.openwall.com/lists/oss-security/2023/04/06/1 A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/data/glsa.git/commit/?id=6109db58da8356109819f2e31a15acb75bbd5b61 commit 6109db58da8356109819f2e31a15acb75bbd5b61 Author: GLSAMaker <glsamaker@gentoo.org> AuthorDate: 2023-11-26 10:06:58 +0000 Commit: Hans de Graaff <graaff@gentoo.org> CommitDate: 2023-11-26 10:07:30 +0000 [ GLSA 202311-16 ] Open vSwitch: Multiple Vulnerabilities Bug: https://bugs.gentoo.org/765346 Bug: https://bugs.gentoo.org/769995 Bug: https://bugs.gentoo.org/803107 Bug: https://bugs.gentoo.org/887561 Signed-off-by: GLSAMaker <glsamaker@gentoo.org> Signed-off-by: Hans de Graaff <graaff@gentoo.org> glsa-202311-16.xml | 51 +++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 51 insertions(+)