First published: Tue Oct 25 2022(Updated: )
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openvswitch | <=2.15.0+ds1-2<=3.1.0-1 | 3.1.0-2 2.15.0+ds1-2+deb11u4 |
debian/openvswitch | <=2.10.7+ds1-0+deb10u1 | 2.10.7+ds1-0+deb10u4 2.15.0+ds1-2+deb11u4 3.1.0-2 3.2.2~git20231029-2 |
redhat/ovs | <3.1.1 | 3.1.1 |
redhat/ovs | <3.0.4 | 3.0.4 |
redhat/ovs | <2.17.6 | 2.17.6 |
redhat/ovs | <2.16.7 | 2.16.7 |
redhat/ovs | <2.15.8 | 2.15.8 |
redhat/ovs | <2.14.9 | 2.14.9 |
redhat/ovs | <2.13.11 | 2.13.11 |
Open vSwitch | >=1.5.0<2.13.11 | |
Open vSwitch | >=2.14.0<2.14.9 | |
Open vSwitch | >=2.15.0<2.15.8 | |
Open vSwitch | >=2.16.0<2.16.7 | |
Open vSwitch | >=2.17.0<2.17.6 | |
Open vSwitch | >=3.0.0<3.0.4 | |
Open vSwitch | =3.1.0 | |
Debian GNU/Linux | =11.0 | |
redhat openshift container platform | =4.0 | |
Red Hat OpenStack Platform | =16.1 | |
Red Hat OpenStack Platform | =16.2 | |
Red Hat OpenStack Platform | =17.0 | |
Red Hat Enterprise Virtualization | =4.0 | |
All of | ||
Any of | ||
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux Fast Datapath | ||
Red Hat Enterprise Linux Fast Datapath | ||
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw is CVE-2023-1668.
CVE-2023-1668 has a severity value of 8.2 (high).
The affected software for CVE-2023-1668 includes openvswitch versions 1.5.0 to 2.13.11, 2.14.0 to 2.14.9, 2.15.0 to 2.15.8, 2.16.0 to 2.16.7, 2.17.0 to 2.17.6, and 3.0.0 to 3.0.4.
To fix the vulnerability CVE-2023-1668, update openvswitch to version 2.10.7+ds1-0+deb10u4, 2.15.0+ds1-2+deb11u4, 3.1.0-2, or 3.2.0-2, depending on your distribution.
More information about CVE-2023-1668 can be found in the references: https://www.openwall.com/lists/oss-security/2023/04/06/1, https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2186245, and https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2186246.