First published: Tue Oct 25 2022(Updated: )
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openvswitch | <=2.15.0+ds1-2<=3.1.0-1 | 3.1.0-2 2.15.0+ds1-2+deb11u4 |
Cloudbase Open Vswitch | >=1.5.0<2.13.11 | |
Cloudbase Open Vswitch | >=2.14.0<2.14.9 | |
Cloudbase Open Vswitch | >=2.15.0<2.15.8 | |
Cloudbase Open Vswitch | >=2.16.0<2.16.7 | |
Cloudbase Open Vswitch | >=2.17.0<2.17.6 | |
Cloudbase Open Vswitch | >=3.0.0<3.0.4 | |
Cloudbase Open Vswitch | =3.1.0 | |
Debian Debian Linux | =11.0 | |
Redhat Openshift Container Platform | =4.0 | |
Redhat Openstack Platform | =16.1 | |
Redhat Openstack Platform | =16.2 | |
Redhat Openstack Platform | =17.0 | |
Redhat Virtualization | =4.0 | |
Redhat Fast Datapath | ||
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
debian/openvswitch | <=2.10.7+ds1-0+deb10u1 | 2.10.7+ds1-0+deb10u4 2.15.0+ds1-2+deb11u4 3.1.0-2 3.2.2~git20231029-2 |
All of | ||
Any of | ||
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Fast Datapath | ||
redhat/ovs | <3.1.1 | 3.1.1 |
redhat/ovs | <3.0.4 | 3.0.4 |
redhat/ovs | <2.17.6 | 2.17.6 |
redhat/ovs | <2.16.7 | 2.16.7 |
redhat/ovs | <2.15.8 | 2.15.8 |
redhat/ovs | <2.14.9 | 2.14.9 |
redhat/ovs | <2.13.11 | 2.13.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw is CVE-2023-1668.
CVE-2023-1668 has a severity value of 8.2 (high).
The affected software for CVE-2023-1668 includes openvswitch versions 1.5.0 to 2.13.11, 2.14.0 to 2.14.9, 2.15.0 to 2.15.8, 2.16.0 to 2.16.7, 2.17.0 to 2.17.6, and 3.0.0 to 3.0.4.
To fix the vulnerability CVE-2023-1668, update openvswitch to version 2.10.7+ds1-0+deb10u4, 2.15.0+ds1-2+deb11u4, 3.1.0-2, or 3.2.0-2, depending on your distribution.
More information about CVE-2023-1668 can be found in the references: https://www.openwall.com/lists/oss-security/2023/04/06/1, https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2186245, and https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2186246.