"Multiple versions of Open vSwitch are vulnerable to crafted LLDP
packets causing denial of service, and data underflow attacks.
Triggering the vulnerabilities requires LLDP processing to be enabled
for a specific port. Open vSwitch versions prior to 2.4.0 are not
The Common Vulnerabilities and Exposures project (cve.mitre.org)
did not assign the identifier to this issue yet. The identifier will
be communicated separately. This issue does not affect the `lldpd'
project, although they share a code base. The issue is related to
parsing the Auto Attach TLVs, which is specific to the Open vSwitch
Please bump to 2.15.7, 2.17.5.
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.
The bug has been referenced in the following commit(s):
Author: GLSAMaker <email@example.com>
AuthorDate: 2023-11-26 10:06:58 +0000
Commit: Hans de Graaff <firstname.lastname@example.org>
CommitDate: 2023-11-26 10:07:30 +0000
[ GLSA 202311-16 ] Open vSwitch: Multiple Vulnerabilities
Signed-off-by: GLSAMaker <email@example.com>
Signed-off-by: Hans de Graaff <firstname.lastname@example.org>
glsa-202311-16.xml | 51 +++++++++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 51 insertions(+)