Summary: | <net-misc/openvswitch-2.17.6: multiple vulnerabilities | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | John Helmert III <ajak> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | prometheanfire, virtualization |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://www.openwall.com/lists/oss-security/2022/12/20/2 | ||
Whiteboard: | B3 [glsa+] | ||
Package list: | Runtime testing required: | --- |
Description
John Helmert III
2022-12-20 21:45:50 UTC
CVE-2023-1668 (https://bugzilla.redhat.com/show_bug.cgi?id=2137666): https://www.openwall.com/lists/oss-security/2023/04/06/1 A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow. The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/data/glsa.git/commit/?id=6109db58da8356109819f2e31a15acb75bbd5b61 commit 6109db58da8356109819f2e31a15acb75bbd5b61 Author: GLSAMaker <glsamaker@gentoo.org> AuthorDate: 2023-11-26 10:06:58 +0000 Commit: Hans de Graaff <graaff@gentoo.org> CommitDate: 2023-11-26 10:07:30 +0000 [ GLSA 202311-16 ] Open vSwitch: Multiple Vulnerabilities Bug: https://bugs.gentoo.org/765346 Bug: https://bugs.gentoo.org/769995 Bug: https://bugs.gentoo.org/803107 Bug: https://bugs.gentoo.org/887561 Signed-off-by: GLSAMaker <glsamaker@gentoo.org> Signed-off-by: Hans de Graaff <graaff@gentoo.org> glsa-202311-16.xml | 51 +++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 51 insertions(+) |