Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 887561 (CVE-2022-4337, CVE-2022-4338, CVE-2023-1668) - <net-misc/openvswitch-2.17.6: multiple vulnerabilities
Summary: <net-misc/openvswitch-2.17.6: multiple vulnerabilities
Status: RESOLVED FIXED
Alias: CVE-2022-4337, CVE-2022-4338, CVE-2023-1668
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor
Assignee: Gentoo Security
URL: https://www.openwall.com/lists/oss-se...
Whiteboard: B3 [glsa+]
Keywords:
Depends on:
Blocks:
 
Reported: 2022-12-20 21:45 UTC by John Helmert III
Modified: 2023-11-26 10:10 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-12-20 21:45:50 UTC
"Multiple versions of Open vSwitch are vulnerable to crafted LLDP
packets causing denial of service, and data underflow attacks.
Triggering the vulnerabilities requires LLDP processing to be enabled
for a specific port.  Open vSwitch versions prior to 2.4.0 are not
vulnerable.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
did not assign the identifier to this issue yet.  The identifier will
be communicated separately.  This issue does not affect the `lldpd'
project, although they share a code base.  The issue is related to
parsing the Auto Attach TLVs, which is specific to the Open vSwitch
implementation."

Please bump to 2.15.7, 2.17.5.
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-04-14 03:01:34 UTC
CVE-2023-1668 (https://bugzilla.redhat.com/show_bug.cgi?id=2137666):
https://www.openwall.com/lists/oss-security/2023/04/06/1

A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.
Comment 2 Larry the Git Cow gentoo-dev 2023-11-26 10:07:48 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/data/glsa.git/commit/?id=6109db58da8356109819f2e31a15acb75bbd5b61

commit 6109db58da8356109819f2e31a15acb75bbd5b61
Author:     GLSAMaker <glsamaker@gentoo.org>
AuthorDate: 2023-11-26 10:06:58 +0000
Commit:     Hans de Graaff <graaff@gentoo.org>
CommitDate: 2023-11-26 10:07:30 +0000

    [ GLSA 202311-16 ] Open vSwitch: Multiple Vulnerabilities
    
    Bug: https://bugs.gentoo.org/765346
    Bug: https://bugs.gentoo.org/769995
    Bug: https://bugs.gentoo.org/803107
    Bug: https://bugs.gentoo.org/887561
    Signed-off-by: GLSAMaker <glsamaker@gentoo.org>
    Signed-off-by: Hans de Graaff <graaff@gentoo.org>

 glsa-202311-16.xml | 51 +++++++++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 51 insertions(+)